Skip to content

Simple pseudo-telnetd backdoor with ptty support

License

Notifications You must be signed in to change notification settings

joseigbv/logind

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

logind

Simple pseudo-telnetd backdoor with ptty support.

It can be very useful in pentesting tasks when you can execute commands through webshell but you need interactive access.

Can be combined with other tools such as 'htun' reverse port tunneler.

Features

  • Pentesting backdoor pseudo-telnetd
  • Launch via webshell
  • Bindshell with interactive pttys support
  • Compatible Linux, Solaris, OSX and BSD.

Getting Started

These instructions will get you a copy of the project up and running on your local machine for development and testing purposes.

Prerequisites

logind should run on any UNIX/Linux box. You only need a relatively modern gcc compiler.

Installing

Download a copy of the project from github:

$ git clone https://github.com/joseigbv/logind.git

Edit 'logind.c' and change configuration (optional).

Compile.

  • linux:
$ gcc -Wall -O2 logind.c -o logind -lutil
  • osx:
$ gcc -Wall -O2 logind.c -o logind
  • solaris:
$ gcc -Wall -O2 logind.c -o logind -lnsl -lsocket

Usage

Upload logind to the compromised host and launch using your webshell:

$ logind

logind dettach from terminal and run as daemon. Now, connect to the specified port using telnet, netcat, ...

$ telnet compromised-host 12345
password: [mypassword]
# 

Authors

License

This project is licensed under the MIT License - see the LICENSE file for details

Releases

No releases published

Packages

No packages published

Languages