HTTP Reverse Shell/Backdoor
- Opens a backdoor on executed device via HTTP protocol
Usage
Attack over LAN
-
Start listener
Default port = 8080 Change port in
listerner.py
on line 33 if another service is using 8080 port -
Edit
IP
andPORT
values inbackdoor.py
on line 48
Attack over the internet
-
Start a ssh tunnel on attacker's device.
Note : Replace
with port on which local server is running -
Copy link that will be available after successfully tunelling between attacker's machine and localhost.run server.
-
Start Listener on your localhost using
-
Replace copied link in
backdoor.py
on line 48. -
Use social engineering to make user to execute the python file or created standalone executable/trojan. Use python to run backdoor.py script.
-
Now use post exploitation tools to gain admin priviliges
Tested on
- Windows 10
- Debian based OSes
- Android Termux