Updates Backdoor Bash : Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL.

Updates Backdoor Bash : Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL.

Changeslog:
+ Fix: accept remote connection from netcat
+ Dispatch des outputs dans les bon logs selon client ou serveur
+ Fix: accept remote connection from netcat

Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)

The main goals of this project is to implement an attack scenario as below :
+ Implement backdoor like remote-shell with Bash
+ Attack Man In the middle with Ettercap (like ARP Spoofing)
+ Hosting a backdoor installer
+ Automate data alteration to inject our backdoor inside the computer of target by a browser
If the target run (naively) the script (ie: the backdoor installer) without reading code source the computer is infected and the attacker can obtain a remote access command
Detect and prevent this kind of attack with NIDS tool as Snort

Notice :
– The programming language was choose only for a Proof of Concept (POC)
– The socket layer is assumed by a portable version of Netcat. I compiled Netcat for i686 and x86_64 computer architecture a put the binary inside this project.
– The transmited data were encrypted with AES-128 (without using Cryptocat). The data are encrypted on the fly via OpenSSL.

Requirements:
– openssl (tested with v1.0.1j)
– ettercap (>= v0.8.1)
– etterfilter (>= v0.8.1)
– etterfilter (>= v0.8.1)
– netcat (The compiled version is “The GNU Netcat” v0.7.1)

How it work ?
The backdoor-client connection work localy and remontly (inside same private network with the same access-point), ie : see “$HOST” inside “config.sh”.

It work only on Unix OS. Currently, tested only on :
– Archlinux
– Debian 7
– Ubuntu 14.10

Sample Test : 

Real Conditions:

Download :

etterfilterSamples : Master.zip  | or Clone Url 

Backdoor bash : Master.zip  | or Clone Url
Source : https://github.com/pilebones | our post before