Skip to content

CWright2022/go_webshell_locker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CDT HW4: Go Account Locker / Webshell

This is Linux malware that can function as an HTTP webshell, as well as acting as "ransomware" (Locking/unlocking user accounts at will). Deploys with an Ansible script.

Created by Cayden Wright (ctw4068@rit.edu) 2/6/2025

Features:

  • Webshell - run commands right in a web browser
  • Account Locking - lock users out of their account with a silly message

Pre-use Instructions:

  1. Set variables

Edit main.go to change the port and "account locked" message if desired.

  1. Compile

Use go build to build the executeable

  1. Create inventory in inventory.ini

Set the IP, username, and password for every host you want to run against. You can either use a password with ansible_password or an SSH key with ansible_private_key_file.

You must be able to access a sudo user over SSH to run this script.

NOTE: No matter whether a password or SSH key is chosen, ansible_become_password must be set in order to install the service!

  1. Run the playbook!

ansible-playbook playbook.yaml -i inventory.yaml

  1. Access

Use index.html (locally) for a GUI. It makes HTTP requests with JSON payloads to http://TARGET_IP:8080/api.

I know this is cumbersome - i am bad at go code

These requests can also be made with any other tool such as curl:

curl http://TARGET_IP:8080/api -d '{"noun": "lock", "verb": "lockme"}'

About

Go Webshell and "Account Locker" - used for CDT competitions

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published