Backdoor Development: Creating a Trojanized System Binary with C

  Переглядів 19,044

Drew Alleman

Drew Alleman

5 місяців тому

Repository: github.com/Drew-Alleman/netst...
0:59 - Downloading and setting up netstat source
1:56 - Importing C Socket libraries
2:34 - Defining Constants
3:45 - Creating the backdoor function
10:57 - Testing trojan
12:00 - Making the backdoor run in the background
14:57 - Modifying the netstat output to hide the backdoor
17:33 - Testing the new trojan binary
18:18 - Virustotal report of the Trojan
18:43 - Replacing the orginal netstat binary
--- Resources
book.hacktricks.xyz/welcome/r...
gtfobins.github.io/
github.com/danielmiessler/Sec...
highon.coffee/blog/reverse-sh...
github.com/BlackArch/webshells

КОМЕНТАРІ: 35
@hayreddinbarbarossa3132
@hayreddinbarbarossa3132 4 місяці тому
Amazing video dear friend. I hope you keep it up.
@MasterCraft_48
@MasterCraft_48 5 місяців тому
That thumbnail is something of beauty
@urban248
@urban248 5 місяців тому
Great content! Keep it up ❤
@drewalleman
@drewalleman 5 місяців тому
Thank you 🙌
@twobob
@twobob 2 місяці тому
fun project
@rubbermaiden
@rubbermaiden Місяць тому
Very nice, congrats
@puucca
@puucca 5 місяців тому
Beautiful
@drewalleman
@drewalleman 5 місяців тому
Thanks
@TsukiCTF
@TsukiCTF 4 місяці тому
Good one
@adamgkruger
@adamgkruger Місяць тому
Loved it!
@takashisclh8766
@takashisclh8766 4 місяці тому
Bro u r goat
@Enerzon
@Enerzon 4 місяці тому
I will be your greatest student.❤
@bravefastrabbit770
@bravefastrabbit770 4 місяці тому
thank you Dear Sir
@antoineflowers6438
@antoineflowers6438 3 місяці тому
Awesome video!!! Do you play HTB battlegrounds or mayhem? That would be a cool video seeing you use this..
@drewalleman
@drewalleman 3 місяці тому
I have not. I will look into it.
@InuYasha-SitBoy
@InuYasha-SitBoy 4 місяці тому
great video. yall ever try binject? it keeps functionality of binaries (if you want) and launches your own custom exe or shellcode. that way you dont have to make a 1000 custom binaries. fyi its golang so the exe is gonna be fairly large, but at least its statically compiled.
@drewalleman
@drewalleman 4 місяці тому
Whattt that's crazy! I will check that out..
@InuYasha-SitBoy
@InuYasha-SitBoy 4 місяці тому
@@drewalleman i honestly think the only video on UKposts about it was literally made by the creator itd be a good video. seems down your alley
@drewalleman
@drewalleman 4 місяці тому
@@InuYasha-SitBoy I will definitely consider it. I am about to start working on another idea that might implement that tool so will see.
@dadamnmayne
@dadamnmayne 4 місяці тому
@@InuYasha-SitBoy usually, you need to hollow the process so that you'll have a place to run the shellcode.
@root924
@root924 Місяць тому
what font in vim?
@dzbro1194
@dzbro1194 27 днів тому
Would a checksum on the netstat binary be enough to determine that it was tampered with?
@drewalleman
@drewalleman 24 дні тому
Yes, that would detect it.
@CN-Aqi
@CN-Aqi 11 днів тому
Hi, I hope to get in touch with you.
@redcrystal3170
@redcrystal3170 4 місяці тому
What OS are you using?
@drewalleman
@drewalleman 4 місяці тому
Ubuntu with some gnome extensions
@appocalypse3012
@appocalypse3012 2 місяці тому
​@@drewallemancould you please share those chrome extensions, its really awesome and I would like to try it out
@drewalleman
@drewalleman 2 місяці тому
​@@appocalypse3012 they are gnome extensions for Ubuntu github.com/Drew-Alleman/neovim
@Chapter_onex
@Chapter_onex 3 місяці тому
sir how can i test that my windows
@drewalleman
@drewalleman 3 місяці тому
This is for Linux idk if the same netstat source can be compiled on Windows, they might have proprietary code.
@nocturne2172
@nocturne2172 2 місяці тому
I thought sysadmins used ss nowadays
@drewalleman
@drewalleman Місяць тому
They do, this is a proof of concept, and a lot of the code in this project can be directly copied over.
@twobob
@twobob 2 місяці тому
audio too quiet
@greyburns6170
@greyburns6170 Місяць тому
Turn up the volume
@twobob
@twobob Місяць тому
@@greyburns6170yeah I did. Compression is what is required. That said it was a good project. just too quiet.
Buffer Overflows: A Symphony of Exploitation
30:18
crow
Переглядів 64 тис.
Making Simple Windows Driver in C
7:26
Nir Lichtman
Переглядів 260 тис.
Мама и дневник Зомби (часть 1)🧟 #shorts
00:47
In 10 Minutes This Room Will Explode!
10:00
MrBeast
Переглядів 52 млн
Malware development 101: Creating your first ever MALWARE
28:00
Leet Cipher
Переглядів 141 тис.
How to Listen to Phone Calls in Wireshark
7:30
Plaintext Packets
Переглядів 122 тис.
Live Malware Development - Learning Malware Development in Rust!
1:08:43
Mitch Edwards (@valhalla_dev)
Переглядів 12 тис.
Coding a Web Server in 25 Lines - Computerphile
17:49
Computerphile
Переглядів 311 тис.
Malware Development: System Calls
44:49
crow
Переглядів 37 тис.
I made a web server In C like a true sigma
3:19
Imran Rahman
Переглядів 471 тис.
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Переглядів 1,2 млн
Malware Development: Process Injection
1:06:21
crow
Переглядів 187 тис.
An Introduction to Malware Analysis
1:10:01
crow
Переглядів 26 тис.