You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
0xLyte
changed the title
[Backdoor] Machine directly accessible on the network - bind mode
Machine directly accessible on the network - bind mode
Feb 11, 2016
-> can execute cmd
-> get the result of the cmd
-> result are placed in a tmp file then read by the duck and send to the client
-> it's a bit hacky (not much)
TODO
* thread
* activate backdoor when needed
to activate the backdoor Oscar need to send valid ICMP packet with valid payload and size
Example : ping 127.0.0.1 -p 78563412 -s 10 -c 1
then he can use the reverse shell
The data in the ICMP packets are in hexadecimal (little-Indian)
backdoor activation will be updated regarding #16
Creation of a listening server which will wait for a connection to be initiated by the attacker.
The text was updated successfully, but these errors were encountered: