exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

fbd-1.1.txt

fbd-1.1.txt
Posted Jul 8, 2002
Authored by Butternuts

Fake Backdoor System v1.1 - Binds to a port and waits for a connection. When attacker runs a command known to the backdoor, it will print a cloned response back to trick the user, and then disconnect the user from the host. Will save to a log file of choice (default is fbdlog.txt) which includes the Hostname and Command used by the attacker.

tags | tool, rootkit
systems | unix
SHA-256 | 5dc3ae887a9df138c0d781f450a5e1ee7cb64aa46e88bf2b62f2a6836f40913b

fbd-1.1.txt

Change Mirror Download
#!/usr/bin/perl
#fbd.pl -> Fake Backdoor v1.1
#Features:
#Can 'clone' commands such as: id, uname -a, ls, pwd, /etc/shadow.
#Prints attack host, and command which was used back to a log file.
#Updates:
#Next version will include more cloned commands.
#May have a fake password system, to make backdoor seem
#more realistic.
#coded by: butternuts -> butternuts@hushmail.com
#date: 7/7/2002


use IO::Socket;
use Net::hostent;

$id = `id`; #Enables real print back when cloned command ran.
$uname = `uname -a`; #Enables real print back when cloned command ran.


$port = "1337"; #Can change to reflect any port
$log = "fbdlog.txt"; #Can change to reflect any logfile.

#If you wanna keep the log file everytime the fake
#backdoor client is started, take out this command.
`rm -rf $log`;
#Rest needs no change.

$socket = IO::Socket::INET->new(
Listen => 10,
LocalPort => $port,
Proto => 'tcp',
Reuse => 1);
die "Cant bind fake backdoor to $port\n" unless $socket;


while ($attacker = $socket->accept()) {
open LOGFILE, ">>$log" or die "Cant open $log: $!\n";
$attackinfo = gethostbyaddr($attacker->peeraddr);
print $attacker "bash# ";
my $in = <$attacker>;

if ($in =~ /id/) {
print $attacker "$id\n";
} elsif ($in =~ /uname -a/) {
print $attacker "$uname\n";
} elsif ($in =~ /\/etc\/shadow/) {
#fake password file, decrypted root password is "dumbass"

print "root:\$1\$WH9Qpjow\$UF\.lGOcf2TazdKFotoanq1:11785:0:99999:7:::\n";
print "bin:*:11785:0:99999:7:::\n";
print "daemon:*:11785:0:99999:7:::\n";
print "adm:*:11785:0:99999:7:::\n";
print "sync:*:11785:0:99999:7:::\n";
print "shutdown:*:11785:0:99999:7:::\n";
print "halt:*:11785:0:99999:7:::\n";
print "mail:*:11785:0:99999:7:::\n";
print "news:*:11785:0:99999:7:::\n";
print "uucp:*:11785:0:99999:7:::\n";
print "operator:*:11785:0:99999:7:::\n";
print "ftp:*:11785:0:99999:7:::\n";
print "nobody:*:11785:0:99999:7:::\n";
print "nscd:!!:11785:0:99999:7:::\n";
print "mailnull:!!:11785:0:99999:7:::\n";
print "xfs:!!:11785:0:99999:7:::\n";
} elsif ($in =~ /ls/) {
print $attacker "bd\n";
print $attacker "bdoor.conf\n";
print $attacker "bdoor.pid\n";
print $attacker "hide\n";
print $attacker "README\n";
} elsif ($in =~ /pwd/) {
print $attacker "/home/fred/.bd\n";
}

close $attacker;

printf LOGFILE "Attacker Hostname: %s\nCommand ran: %s", $attackinfo->name || $attacker->peerhost, $in;

close LOGFILE;
}

#EOF


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close