Description: In one of my PT(Penetration Testing) jobs i got dead reverse shell.
Dead reverse shell means: the shell got back to me but after the first command it got closed.
So after few minutes i found my answer... the server got to me through proxy and firewall.
So i thought maybe i can fix it by encrypting the traffic and then i found cryptcat.
This video shows the differences between cryptcat traffic and netcat traffic.
Tools used:
netcat
cryptcat
VMware
Wireshark
Music:
Infected Mushroom - Im The Supervisor
Tags: Demonstration , Hacking Pentesting , hack , hacker , ethical hacking , web secuirty , secuirty , Hacker (term) , White Hat (computer Security) , Hacker (computer Security) , Computer Security (Industry) , Hacks , Cryptcat , Netcat , VMware , traffic , Penetration Testing , reverse shell , shell , Netcat VS Cryptcat , Wireshark ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
very interesting, from what I see Cryptcat uses twofish and has a default secret key of 'metalica' but regardless I wonder if if we could do sort or a dictionary attack against the encryption...Then again, any encryption If it can be decrypted it can be broken.
You should be able to use ncat with ssl flag too (part of nmap).