From 9f974a81d69e0964e7bc696a241494282219789a Mon Sep 17 00:00:00 2001 From: Andrew Rioux Date: Fri, 28 Apr 2023 18:25:40 -0400 Subject: [PATCH] docs: added better documentation --- README.org | 2 ++ examples/bind-shell/README.org | 13 +++++++++++++ 2 files changed, 15 insertions(+) create mode 100644 examples/bind-shell/README.org diff --git a/README.org b/README.org index de82451..aaf8ee6 100644 --- a/README.org +++ b/README.org @@ -7,3 +7,5 @@ Developed using libpcap to enable evading local firewalls and with an eye toward * Development To develop or compile this project, open it in GitHub Codespaces or using Visual Studio Code's Dev Container extension (requires Docker to be installed) and run ~git submodule update~ + +* [[./examples/bind-shell/README.org][Example bind shell implementation]] diff --git a/examples/bind-shell/README.org b/examples/bind-shell/README.org new file mode 100644 index 0000000..c39bd14 --- /dev/null +++ b/examples/bind-shell/README.org @@ -0,0 +1,13 @@ +#+TITLE: Example bind shell proof of concept + +This bind shell works through local host firewalls on Linux systems using UDP to receive messages, verify them against a public key, run the commands specified, and return the results and display it over the network. + +* Setup +** libpcap +Follow the directions in the main README in order to pull in the libpcap dependency + +** Generate keys +In order to build the example backdoor/client, generate public and private keys by going into ~/workspaces/sparse/examples/bind-shell/key-generator~ and run ~cargo run~ + +** Build the code +Once the previous steps are completed, open two shells. In one, run ~docker-compose up examples_bindshell_target~, and in the other run ~docker-compose run examples_bindshell_client~. It will be possible to type in commands to examples_bindshell_client and run them in the target container \ No newline at end of file