boopkit
boopkit copied to clipboard
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
Hello, I wasn't able to build the bin I was receiving this errors: ``` ~/bookit/boopkit-1.3.0$$ make bpftool btf dump file /sys/kernel/btf/vmlinux format c > vmlinux.h -> Building pr0be.boop.o clang -S...
![image](https://user-images.githubusercontent.com/102639729/168083399-66561070-b83c-4915-ae47-077e298d1391.png)
Logs from the report: ``` make bpftool btf dump file /sys/kernel/btf/vmlinux format c > vmlinux.h Error: failed to load BTF from /sys/kernel/btf/vmlinux: Invalid argument make: *** [Makefile:87: autogen] Error 22...
Hey there, I was trying to build this project on a fresh Ubuntu 20.04 install I installed the following for the main dependencies: - linux-tools-common - linux-tools-5.13.0-40-generic - clang -...
Right now there are some encapsulation errors while transmitting the payload over a SYN packet. Can be replicated: Run boopkit in payload-only mode ``` boopkit -p ``` Boop with a...
We want to pin the eBPF probe such that it will persist across reboot. This will allow us to hide the userspace component in clever ways. Source: https://lwn.net/Articles/664688/
Right now the `saddr` is subject to change during every hop. Ideally we could find a few bytes of memory we can pass over TCP in order to tell the...
The new #4 feature has noisy public servers firing off `ncat` commands against it self alot. Ideally we offer a "denylist" that can be plumbed through to boopkit at runtime...
Meet a segmentation fault situation: Thread 2 "boopkit" received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7ffff7cc2700 (LWP 936627)] 0x00000000003100d9 in xcap (v_dev_name=0x315f68 ) at dpi.c:217 217 ether_type = ntohs(ep->ether_type);...