Friday 1 April 2016

The Python Rat Tool

0x00 JSbackdoor

About javascript backdoor please see:

0x01 Description

After studying JSbackdoor thinking about writing a py version, and later found to have a small partner wrote the following address: JSRat-Py
When tested using, in order to be more convenient for the above script has been modified to add the -c parameter can automatically execute commands after the client connection. Specific use is as follows: 

nteractive mode command is as follows :
 python MyJSRat.py -i 192.168.1.101 -p 8080
-u is optional, even for the return url address.
Interactive mode for file upload, download, delete, command execution.
Run mode command as follows :
python MyJSRat.py -i 192.168.1.101 -p 8080 -c "whoami"
Under Run mode, automatically executed after obtaining the specified command shell, use the new new the ActiveXObject ( "WScript.Shell"). The Run (Command, 0, to true) , perform no echo, no bomb box.
Interface as follows:
Alt text
Send command:
Alt text

0x02 URL Description

0x03 actual use

CHM + JSRAT = Getshell
Alt text
Download tool : https://goo.gl/Pp3MNV