Skip to content

persistentReverseDucky: provides you persistent reverse shell remotely/locally by creating non-root systemd service within 10 secs.

Notifications You must be signed in to change notification settings

drapl0n/persistentReverseDucky

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

About:

  • Title: persistentReverseDucky
  • Description: persistentReverseDucky provides you persistent reverse shell remotely/locally..
  • AUTHOR: drapl0n
  • Version: 1.0
  • Category: Remote Access
  • Target: Unix-like operating systems with systemd.
  • Attackmodes: HID

persistentReverseDucky: provides you persistent reverse shell remotely/locally by creating non-root systemd service within 10 secs.

  • Note change ip address(0.0.0.0) and port number(4444) to your server's ip address and port number.
  • Only for educational purpose.

Workflow:

Keeping tracks clear by disabling and deleting history. Creating hidden directory to store payload. Creating payload which checks whether internet is connected to the target system, if yes then it creates reverse shell to attackers machine. Creating non-root systemd service to keep payload running in background. Enabling service. Autostarting service on trigger of terminal emulator or shell.

Algorithm:

  1. Stop storing history, this helps to keep tracks clear from begining.
  2. Creating reverse shell.
  3. Creating non-root systemd service.
  4. Enabling service.
  5. Starting service on trigger of firing terminal emulator/shell.

Support me if you like my work:

About

persistentReverseDucky: provides you persistent reverse shell remotely/locally by creating non-root systemd service within 10 secs.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published