Skip to content

locaIhost/gitm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

14 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

General Information

The main task after gaining access to an attacked machine is to be persistent. After all, access can be lost due to a reboot of the attacked system, loss of credentials, or blocking of remote access. This scenario uses a bunch of C, systemd and ingenuity.


About

The program inserts the public key into authorized_keys and deletes the key if it finds a match. At the moment this scenario conditions the use of a systemd-timer. I originally chose the binary name php7-session-clean because in my opinion it integrates inconspicuously into the usual logic when used with the systemd-timer. Clean PHP session files.


Runing

  1. Edit the config/const.h file and change the values to your desired values.
  2. Run make.
  3. Move the binary file to the captured machine.
  4. Hide for example in /bin/ and run the timer.
  5. Prepare systemd configuration files to your liking.
  6. Profit =)

You can use your fantasy and change the name of the binary to your taste πŸ”₯


Reservation

  1. I don't claim to be a super inventive idea or concept 🐣
  2. I understand that any average administrator will be able to detect this anomaly πŸ§™β€β™€οΈ
  3. The code was created for academic purposes in learning C πŸ‘©β€πŸŽ“
  4. If you want to help, improve, suggest, correct, do it! 🏁
  5. Give me u star for me ⭐

About

Tactical for persistence on Linux. ⏰

Resources

License

Stars

Watchers

Forks

Packages

No packages published