-- raptor_winudf.sql - A MySQL UDF backdoor kit for Windows -- Copyright (c) 2007 Marco Ivaldi <raptor@0xdeadbeef.info> -- -- This is a MySQL backdoor kit for Windows based on the UDFs (User Defined -- Functions) mechanism. Use it to spawn a reverse shell (netcat UDF on port -- 80/tcp) or to execute single OS commands (exec UDF). Don't forget to edit -- the MySQL bin path below according to your target's configuration. -- -- Thanks to KDM for asking me to do research on this interesting subject! -- -- See also: -- http://www.0xdeadbeef.info/exploits/raptor_udf.c -- http://www.0xdeadbeef.info/exploits/raptor_udf2.c -- -- Tested on: -- MySQL 4.0.18-win32 (running on Windows XP SP2) -- MySQL 4.1.22-win32 (running on Windows XP SP2) -- MySQL 5.0.27-win32 (running on Windows XP SP2)
$Id: README,v 1.1.1.1 2007/02/06 10:59:53 raptor Exp $
raptor_winudf.tgz - A MySQL UDF backdoor kit for Windows Copyright (c) 2007 Marco Ivaldi <raptor@0xdeadbeef.info>
This is a MySQL backdoor kit for Windows based on the UDFs (User Defined Functions) mechanism. Use it to spawn a reverse shell (netcat UDF on port 80/tcp) or to execute single OS commands (exec UDF). Don't forget to edit the MySQL bin path in SQL source according to your target's configuration.
Package contents: ./README This file ./bin/ShellTest.dll Binary (compiled) DLL ./src/* Visual Studio C++ sources
How to create a dump of your custom binary file:
# mysql -h 192.168.0.203 mysql> use mysql; mysql> create table foo(line blob); mysql> insert into foo values(load_file('c:/mysql/bin/shelltest.dll')); mysql> quit # mysqldump -h 192.168.0.203 mysql foo > shelltest.sql
|