[New Tool] quasiBot v0.3 Beta Complex Webshell Manager
QuasiBot is a complex webshell manager written in PHP, which operate on web-based backdoors implemented by user himself. Using prepared php backdoors, quasiBot will work as C&C trying to communicate with each backdoor.
Tool goes beyond average web-shell managers, since it delivers useful functions for scanning, exploiting and so on. It is quasi-HTTP botnet, therefore it is called. Also, quasiBot allows you to perform various bruteforce attacks on services such as ftp, ssh or databases.
All data about bots is stored in SQL database, ATM only MySQL is supported. TOR proxy is also supported, the goal was to create secure connection between C&C and backdoors; using SOCKS5, it is able to torify all connections between you and web server. All configuration is stored in config file.
You will need any web server software; tested on Linux, Apache 2.2 and PHP 5.4.4. Fully written in PHP.
How it works?
quasiBot is operating on web-shells delivered by user, each backdoor is being verified by md5 hash which changes every hour
quasiBot (C&C) -[request/verification]-> Bots (Webshells) -[response/verification]-> quasiBot (C&C) -[request/command]-> Bots (Webshells) -[response/execution]-> quasiBot (C&C)
Backdoors consists of two types, with and without DDoS module, source code is included and displayed in home page;
Connection between C&C and server is being supported by curl, TOR proxy is supported, User Agent is being randomized from an array
quasiBot (C&C) -[PROXY/TOR]-> Bots (Webshells) <-[PROXY/TOR]- quasiBot (C&C)
Webshells can be removed and added at ‘Settings’ tab, they are stored in database
- ‘RSS‘ tab contain latest exploits and vulnerabilities feeds.
- ‘RCE‘ tab allows to perform Remote Code Execution on specific server using selected PHP function.
- ‘Scan‘ tab allows to resolve IP or URL and perform basic scan using nmap, dig and whoisuseful in the phase of gathering information.
- ‘Pwn‘ tab stands for few functions, which generally will help collect informations about server and try to find exploits for currently used OS version using Exploit Suggestor module.
- ‘MySQL Manager‘, as the name says, can be used to perform basic operations on specific databaseit could be helpful while looking for config files that include mysql connections on remote server; it also displays some informations about it’s envoirment.
- ‘Run‘ tab allows you to run specific command on every bots at once.
- ‘DDoS‘ tab allows you to perform UDP DoS attacks using all bots or single one, expanded backdoor is required.
- ‘Shell‘ tab allows you to spawn reverse or bind shell; you may pick between few languages that will be used for creating reverse shell.
- You may enable authorisation module, user is being validated by session, auth credentials are stored in config file, not in db; using Cookie Auth, user won’t be able to use quasiBot until specific cookie will be used.
- ‘Bruteforce‘ category consists of few modules, they allow you to perform single or massive attacks on ftp, ssh, mysql, pgsql, mssql and wordpress.
- Broken credentials are stored in database, bruteforce on websites can be done via tor
- Whole front-end is maintaned by a pleasant, functional interface.
[button size=large style=round color=red align=none url=https://github.com/Smaash/quasibot]quasiBot v0.3 Beta Complex Webshell Manager[/button]
Thanks to Smash_, for sharing this tool with us. 😉