ddoor: cross platform backdoor using dns txt records
ddoor
cross-platform backdoor using dns txt records
What is ddor?
ddor is a cross-platform lightweight backdoor that uses txt records to execute commands on infected machines.
Features
- Allows a single txt record to have seperate commands for both Linux and Windows machines
- List of around 10 public DNS servers that it randomly chooses from
- Unpredictable call back times
- Encrypts txt record using xor with custom password
Linux Features:
- Anti-Debugging, if ptrace is detected as being attached to the process it will exit.
- Process Name/Thread names are cloaked, a fake name overwrites all of the system arguments and file name to make it seem like a legitimate program.
- Automatically Daemonizes
- Tries to set GUID/UID to 0 (root)
Windows Features:
- Hides Console Window
- Stub Size of around 20kb
Install
git clone https://github.com/rek7/ddoor.git
pip3 install -r requirements.txt
Make sure to edit config.h and replace the provided domain with yours, you can change the fake name as well as the password.
To create a Linux binary:
Run the compile.sh script, this will create a file called binary in the bin folder.
To Create a Windows Binary:
This project was built using VS 2019 if you open the sln file using VS2019 select the release build and build it.
Usage
Run payload_manager.py with python3 to create a hex-encoded payload, then update or create a txt record for your domain, make sure that the TTL is set to 300 seconds!!!
Copyright (c) 2019 e
Source: https://github.com/rek7/