In this article, we are going to cover the tactics of Hidden BIND TCP shellcode. Every organization has multiple scanning tools to scan their network and to identify the new or unidentified open ports. In this type of environment, it's very difficult to hide the suspicious bind shellcode and remains unnoticed from the reach of their scanning tools.
But how can we sit idle without the set of a new idea? We
are here with the concept of Hidden Bind TCP shell, this shellcode listens to
the connection only from the allowed IP address of the host (I.e Ahost), and
for other connections, it replies with an RST packet, (A reset packet is simply
one with no payload and with the RST bit set in the TCP header flags). This is the
way the port will appear as “closed” and help us to hide the shellcode.
Pre-requisites for Lap Set up
·
Kali Linux(Pentester’s Machine)
·
Window 10 (Victim’s Machine)
· Zenmap Tool
Let's Begin!!
Using the msfvenom, we are going to
create a payload for windows by shell_hidden_bind_tcp and will save it in the
exe format name as file.exe, now we will send the file on the victim’s PC and
execute that malicious file.exe on the victim’s system. it will open a new
service on the victim’s pc having port number 4321 which makes the connection
with the pentester’s IP.
Now, In case the victim runs the netstat command, which will display all the active connections as showing in the below screenshot. In the output, port 4321 does not have an IP address but it appears as some internal services are running through local or internal connections. On the other hand, the connection is already established with the Pentester’s IP.
If the victim wants to verify the
service for unknown port 4321 and will try to scan that port using the Zenmap tool, the result of the Nmap will show
the closed state of port 4321 which means its undetectable through the scanning
tool, on the other hand, it is making a connection with the Pentester’s IP.
On the other side, if we scan the
same port from outside the network of the victim through Kali. The result of
the same Nmap command shows the open state of port 4321.
This is the magic of the hidden
shellcode to remain undetectable from the reach of different scanning tools.
As we have already executed
malicious payload file.exe on the victim’s PC so through the netcat we have a
session.





0 comments:
Post a Comment