-
Notifications
You must be signed in to change notification settings - Fork 0
/
README.txt
31 lines (24 loc) · 1.32 KB
/
README.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
|==================================|
|==== VB SHELL - REVERSE TCP ====|
|==================================|
Released on:
10.29.2024 @ 14:56
Description:
Via a Reverse-TCP-connection, the 'server.exe' controller can manage
multiple incoming-connections from devices infected with 'client.exe'
How to use:
Simply edit the Client project and replace the RHOST and RPORT value
with the correct IP Address and server Port assigned to the attacker C2.
Note: There are no features/functions built into this shell. It only
functions as a remote cmd shell into a system. If said command
statements sent to the user yield a verbose output, the client.exe
backdoor will report the output back to the attacker.
This shell CANNOT manage sessions with devices in a concurrent
manner, nor switch between sessions. As each device phones-home
to server.exe you will have the ability to reject or accept each
incoming connection. After a session is over, enter "goodbye"
Warning: after "goodbye" is sent, the shell will no longer report
home. This can be easily modified to revive the connection regardless
of commands given by the C2. This overall basic shell design servers
as a basic penetration testing / red teaming program.
Good luck, and use responsibly!