BigNerd95 / Chimay-Red

Working POC of Mikrotik exploit from Vault 7 CIA Leaks
649 stars 216 forks source link

How to add a backdoor to a real device #11

Closed QingyangChen closed 6 years ago

QingyangChen commented 6 years ago

Hi , I'd like to ask you for some questions. In the x86 simulation environment,I learn to add a backdoor. Now, I have a real device : HAP Lite , RB941-2nD, MIPS 24Kc v7.4. I downgrade it to 6.38.4 but I do not know how to add a backdoor to the real devices. In addition,I found the firewall will drop all requests not coming from LAN. Is not that we can not exploit it from the Internet?

BigNerd95 commented 6 years ago

Did you try to use the reverse shell and then create the etc, rc.d, run.d and the bash file?

If the firewall block http traffic from wan you can't exploit of course

QingyangChen commented 6 years ago

so cool !!! I did not notice the way of reverse shell. I have successfully used this script. Thank you !!!