Sandman is a backdoor that meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (protocol to sync time & date) to download an arbitrary shellcode from a pre defined server.
Since NTP is a protocol that is overlooked by many defenders resulting wide network accessability.
Run on windows / *nix machine:
python3 sandman_server.py "<Network Adapter>" "Payload Url"
To start, you can compile the SandmanBackdoor as mentioned below, with csc and run it in your favorite way on the compromised machine.
The server can run on windows / *nix machines if the requirements installed.
-
Currently, the project does not have ip spoofing capabilities (will be changed in the next version).
-
A NTP packet must be in size of 48 bytes, therefore you will need to shorten your url or send it in 2 packets, you can use a url shortener like bit.ly (might add support for longer url in the next version).
- Python 3.9
- Requiremenets specified in the requirements file.
To create this project I used Visual Studio 2022, but as mentioned in the usage section it can be compiled with both VS2022 and csc.
-
A shellcode is injected to RuntimeBroker.
-
Suspicious NTP communication, starts with known magic header.
I'll happily accept contribution, make a pull request and I will review it!