Skip to content

Latest commit

 

History

History
64 lines (47 loc) · 2.51 KB

README.md

File metadata and controls

64 lines (47 loc) · 2.51 KB

How I Created A Backdoor 😎

Linux-ok MacOS-ok Window-ok presentation

⚠️ Disclaimer

Any actions and or activities related to the material contained within this repository is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this repository to break the law.


👌🏻 Basic Backdoor

Description

Basic backdoor is the easiest backdoor that you could make. The victim is just a server that redirects incoming messages into a shell and then sends back the shell output. The victim IP can be found easly with nmap.

⚠️ You usually need to be on the same subnet of the victim

Pre-requirements

  • netcat (usually already installed)

Usage

# On the victim
./basic-backdoor/backdoor.sh
# On the attacker
nc $VICTIM-IP 8080

💪🏻 Advanced Backdoor

Description

This advanced backdoor allows to bypass the firewall and to communicate outside subnetwork. Now the victim is just a client, the attacker is the server. When the victim is connected to the attacker's server, he'll execute command provided by the attacker and then send it back its output. You can configure PORT and DNS inside the files backdoor-client.py and backdoor-server.py.

You can use freenom to get a free DNS. You can use aws to get free server.

Pre-requirements

  • python3 (usually already installed)
  • pip (only for attacker)

Usage

# On the victim for non-permanent backdoor
./advanced-backdoor/backdoor-client.py

# ⚠️ On the victim for "PERMANENT" backdoor
./advanced-backdoor/setup.sh
# On the attacker (where the DNS is pointing to)
pip3 install -r ./advanced-backdoor/requirements.txt
./advanced-backdoor/backdoor-server.py

➡️ Take time to understand how it's working, PR are welcomed