Sponsored by: █ Sparkhost - Hosting Without Compromises! █ Hybrid Performance Web Hosting █ Spark Host Stream Hosting █ Hybrid IRC & IRCd Server Shell Accounts
Posted 17 March 2005 - 05:18 AM
If you own a system with a connect back exploit you need to have netcat listen on your pc. Then you have a dos based connection to execute commands on the remote machine.
Now I'd like to code a program in VB that works like the listening netcat. It waits on a specifyed port for the incoming connection or an just exploited machine.
I can't code C, if I could I knew how to do this... So my question is: Is it possible to make this in VB and with help of WinSock?
Posted 17 March 2005 - 05:40 AM
Posted 17 March 2005 - 09:49 AM
But nice idea Good for the learning
Yes i think is possible t owrite that in VB, socket are easy to use. More than C.
Posted 17 March 2005 - 10:26 AM
@Pro21: The reason why I want to write this, is to make hacking more comfortable. You can save commands you have already written and the main fact: I will include a feature that allows to open a binary and transfer it onto the server.
I hope I can do it ^^
Posted 19 March 2005 - 05:31 AM
I need to play around to test it...
Posted 27 March 2005 - 08:51 AM
Posted 23 April 2005 - 08:41 PM
But this proggy has not may do as many as netcat such as : port scanning or redirecting .
@ComSec post Mar 18 2005, 01:26 PM
i think this might interest you... here is the full vb source...
i have also compiled it to exe inc in zip
it will help give you idea's for your program
It's just a simple tcp/udp program
Posted 23 April 2005 - 11:42 PM
whats the point in having a ready made tool that did it all.... this thread would be pointless
The question is... Is it compatible to netcat's commands?
no idea passiw..... i compiled it BUT i have NOT tested it
BTW any progress with this yet anyone ?
Please read the Forum Rules !!!
Posted 04 June 2005 - 03:44 PM
Posted 02 February 2006 - 04:42 AM
Very nice too have a look at the source code.. So i am having this idea.
A tool just like this but with an exloit libary. when I exploit something using metasploit or whatever i sniff the traffic with ethereal and then save it so it can be implemented in the tool
work in progress, will be posted in the download section when it's finished
all my thanks to Kenny L
Posted 09 February 2006 - 12:57 PM
if you want to include some commands just do it.
if s = "shutdown" then shell "shutdown.exe -s -t 0"
if s = "reboot" then shell "shutdown.exe -r -t 0"
if s = "doanyshit" then call API_that_does_funny_things
a few modifications of the source, some hiding commands ("app.taskvisible = false, me.hide")
and a good filename with a API registry modification to autorun it and its done.
your first trojan is born.
Posted 13 March 2006 - 01:26 AM
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users