Backdoor Development: Creating a Trojanized System Binary with C
19,057
Published 2023-11-19
0:59 - Downloading and setting up netstat source
1:56 - Importing C Socket libraries
2:34 - Defining Constants
3:45 - Creating the backdoor function
10:57 - Testing trojan
12:00 - Making the backdoor run in the background
14:57 - Modifying the netstat output to hide the backdoor
17:33 - Testing the new trojan binary
18:18 - Virustotal report of the Trojan
18:43 - Replacing the orginal netstat binary
--- Resources
book.hacktricks.xyz/welcome/readme
gtfobins.github.io/
github.com/danielmiessler/SecLists/
highon.coffee/blog/reverse-shell-cheat-sheet/
github.com/BlackArch/webshells
All Comments (20)
-
Amazing video dear friend. I hope you keep it up.
-
Great content! Keep it up ❤
-
That thumbnail is something of beauty
-
Very nice, congrats
-
fun project
-
Beautiful
-
Good one
-
Loved it! :face-fuchsia-wide-eyes:
-
great video. yall ever try binject? it keeps functionality of binaries (if you want) and launches your own custom exe or shellcode. that way you dont have to make a 1000 custom binaries. fyi its golang so the exe is gonna be fairly large, but at least its statically compiled.
-
Bro u r goat
-
Awesome video!!! Do you play HTB battlegrounds or mayhem? That would be a cool video seeing you use this..
-
what font in vim?
-
I will be your greatest student.❤
-
Hi, I hope to get in touch with you.
-
Would a checksum on the netstat binary be enough to determine that it was tampered with?
-
What OS are you using?
-
sir how can i test that my windows
-
I thought sysadmins used ss nowadays
-
audio too quiet