Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
jayo78 authored May 22, 2020
1 parent 44877aa commit 8daa476
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
## Description
This is a persistent reverse shell that uses windows TCP sockets to communicate with a listener. The listener can be anything that accepts a remote connection, I used netcat to test (nc -lnvp 8080). Persistence is achieved through a registry run key that executes the backdoor path on a reboot. The purpose of this project was to gain a grasp of simple winAPI calls and sockets in C, as well as explore malware techniques. As of writing this, the executable goes undetected by windows defender and has a virustotal.com score of 3/72. The reason for its low detection rate could be due to the simplicity of the executable which doesn't pack/encrypt itself or use any typical process injection methods.

#### Execution
### Execution

1. reverse shell executed
2. copy self to temp folder
Expand All @@ -15,7 +15,7 @@ This is a persistent reverse shell that uses windows TCP sockets to communicate

*If the backdoor loses connection to the listener it will continue to beacon every 5 seconds to re-establish connection which could raise a red flag for Anti-virus*

### Notes:
#### Notes:

- See Makefile for intended compilation and gcc flags for a compact exe
- Need to use a compiler that supports windows runtime (mingw)
Expand Down

0 comments on commit 8daa476

Please sign in to comment.