Defend yourself against AtlasVPN Bug-Door
This script has been developed to allow you to mitigate a well-known vulnerability in the AtlasVPN client based on its APIs, which, as of today, has not been resolved. The term "bugdoor" has been coined to describe this situation, as the bug has been reported multiple times without being addressed, effectively creating an open backdoor (bug + backdoor).pull/382/head
parent
95aab5627a
commit
8163efe34f
|
@ -0,0 +1,32 @@
|
|||
REM ############################################################
|
||||
REM # #
|
||||
REM # Title : Defend yourself against AtlasVPN Bug-Door #
|
||||
REM # Author : Aleff #
|
||||
REM # Version : 1.0 #
|
||||
REM # Category : Execution #
|
||||
REM # Target : Linux #
|
||||
REM # #
|
||||
REM ############################################################
|
||||
|
||||
REM Requirements:
|
||||
REM - Administrator Permission
|
||||
REM - AtlasVPN installed
|
||||
|
||||
REM Define the sudo user password
|
||||
DEFINE #SUDO-PWS example
|
||||
|
||||
DELAY 1000
|
||||
CTRL-ALT t
|
||||
DELAY 2000
|
||||
|
||||
REM Add the rule and close the shell
|
||||
STRINGLN sudo iptables -A INPUT -p tcp --dport 8076 -m state --state NEW -j DROP; exit;
|
||||
|
||||
REM Add the rule and display it
|
||||
REM STRINGLN sudo iptables -A INPUT -p tcp --dport 8076 -m state --state NEW -j DROP; sudo iptables -S | grep "8076";
|
||||
|
||||
REM Remove the rule
|
||||
REM STRINGLN sudo iptables -D INPUT -p tcp --dport 8076 -m state --state NEW -j DROP
|
||||
|
||||
DELAY 500
|
||||
STRINGLN #SUDO-PWS
|
Loading…
Reference in New Issue