Location:
Search - backdoor linux
Search list
Description: Linux Kernel Exploit研究和探索,溢出植入型木马(后门)的原型实现,HP-UX溢出程序编写,DDOS攻防与追踪技术,内核后门实现及其检测,浅析反病毒引擎,Linux端口复用技术简述,应用SMB/CIFS协议,SocksCap的简单实现,FreeBSD私有文件系统的制作,智能化安全策略探索--对于网络扫描防御的实现,计算机病毒特征码提取分析-Linux Kernel Exploit study and exploration, overflow into Trojan (back door) Prototype Implementation, HP-UX overflow programming, DDOS defense and tracking technology, and achieve kernel backdoor detection of anti-virus engine, the Linux port Reuse briefly application SMB / CIFS agreement SocksCap the simple realization, FreeBSD private document production system, intelligent security strategy -- defense network scanning the realization Computer Virus Scan Extraction
Platform: |
Size: 506249 |
Author: hulipeng |
Hits:
Description: Linux backdoor source code-backdoor Linux source code
Platform: |
Size: 7775 |
Author: 萨姆 |
Hits:
Description: Linux Kernel Exploit研究和探索,溢出植入型木马(后门)的原型实现,HP-UX溢出程序编写,DDOS攻防与追踪技术,内核后门实现及其检测,浅析反病毒引擎,Linux端口复用技术简述,应用SMB/CIFS协议,SocksCap的简单实现,FreeBSD私有文件系统的制作,智能化安全策略探索--对于网络扫描防御的实现,计算机病毒特征码提取分析-Linux Kernel Exploit study and exploration, overflow into Trojan (back door) Prototype Implementation, HP-UX overflow programming, DDOS defense and tracking technology, and achieve kernel backdoor detection of anti-virus engine, the Linux port Reuse briefly application SMB/CIFS agreement SocksCap the simple realization, FreeBSD private document production system, intelligent security strategy-- defense network scanning the realization Computer Virus Scan Extraction
Platform: |
Size: 505856 |
Author: hulipeng |
Hits:
Description: Linux backdoor source code-backdoor Linux source code
Platform: |
Size: 8192 |
Author: 萨姆 |
Hits:
Description: 一个多功能 linux 后门的源代码 C-A multi-functional linux backdoor source code C
Platform: |
Size: 6144 |
Author: your name |
Hits:
Description: backdoor源代码,在LINUX环境下运行,希望大家多上传点代码,互相学习-backdoor source code, in the LINUX environment running, I hope you upload more than point code, learn from each other
Platform: |
Size: 1024 |
Author: wqz2006 |
Hits:
Description: 在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.-rootkit for linux
Platform: |
Size: 269312 |
Author: kkk |
Hits:
Description: 史上最全功能的Backdoor程序,包含了http服务、socks服务等等。-* allinone.c is
* a Http server,
* a sockets transmit server,
* a shell backdoor,
* a icmp backdoor,
* a bind shell backdoor,
* a like http shell,
* it can translate file from remote host,
* it can give you a socks5 proxy,
* it can use for to attack, jumps the extension, Visits other machines.
* it can give you a root shell.:)
Platform: |
Size: 6144 |
Author: zheng |
Hits:
Description: 一个多功能linux后门的源代码.txt-linux backdoor
Platform: |
Size: 2048 |
Author: abc |
Hits:
Description: 如果要在Win2000下实现类似Ping BackDoor for Linux的后门,必须以 sniffer 的方式监听ICMP包,而在win2000下写一个简单的sniffer-If you want to Win2000 achieve Ping BackDoor for Linux similar to the back door, you must listen ICMP packet sniffer manner, but in the next win2000 write a simple sniffer
Platform: |
Size: 4096 |
Author: 张小麒 |
Hits:
Description: UNIX\Linux backdoor source code .
Platform: |
Size: 1024 |
Author: tt |
Hits:
Description: 一个linux的pingshell后门,首先编译pingshell.c后门, 编译后生成的pingshell这个文件就是我们的后门了,然后使用命令
pingshell 1017 5555,意思是当接受当ping包长度为1017时监听本地5555端口,ping -l 1017 127.0.0.1
然后用nc进行连接,nc -nvv ip 5555即可。
注:这种后门有个问题就是如果进行暴力破解的话,也不太安全》-First compile pingshell.c backdoor, the compiled file pingshell this is our back door, and then use the command
pingshell 1017 5555, meaning that if accepted as ping packet length is 1017 local time listening 5555 port, ping-l 1017 127.0.0.1
Then connect nc, nc-nvv ip 5555 can be.
Note: This question is if there is a back door brute force, it is not very safe.
Platform: |
Size: 348160 |
Author: 陈方安生 |
Hits: