Today I am going to be demonstrating how to use a free dynamic DNS solution for our Python backdoor. Reasons to use such a service vary, like keeping a hostname reachable if you have a dynamic IP address, adding an extra layer of stealthiness to our current shell, or simply to stare at wireshark and see what happens — my favorite channel! Let’s do thisssss! 😀
Before we get started with the tutorial, I would like to thank everybody that contributed with ideas, testing and especially to good fellow hacker mystcaster (click here to check his blog) who actually contributed to almost the entirety of today’s post… basically he put down all of the code for this sixth part so credits go out to him on this one.
He emailed me earlier this week with “his version” of the Python backdoor, where he broke down all of the previous code into functions — making it a lot easier to read — and also added many new features that weren’t available previously. Since his version of the backdoor was based on the fourth part of our series, all I had to do was merge it together with the multiple clients server and it was good to go!
His effort had a huge impact in my Python skills as well. Just from peeping his code, I learned how to break it down into functions, discovered why a few ideas (file transfer inside the encrypted tunnel) weren’t working before and overall helped me evolve. So I hope you guys will keep collaborating, since it just helps everyone. 🙂
Changes & Features
- AES Cipher Bugfix
- Change Directory
- Client Persistence
- Client Socket Error Checking
- Encrypted File Transfer
- File Transfer Error Checking
I do recognize some people made some awesome suggestions in the comments and we will get to them eventually, so if you come up with any ideas just leave a comment below. For now we will focus on some remote aspects of the backdoor…
Click here to download the server/client source: [ DOWNLOAD ]
Watch in high quality & full screen. Enjoy!