Hiding your callback through HTTPS

#ReverseShell over #HTTPS is a unique technique. In this video, we will explore #CURL shell and understand how the mechanics work under the hood. watch: ht...

Used #girsh today for the first time with a #HTB box. It is a listener for a reverse shell spawning a fully interactive shell automatically. Worked quite well. I must say, I do miss autocomplete if it is not available.

I did not do a code review of this tool as I was only using it on an isolated VM. Run at your own risk ;)

https://github.com/nodauf/Girsh

#reverseShell

GitHub - nodauf/Girsh: Automatically spawn a reverse shell fully interactive for Linux or Windows victim

Automatically spawn a reverse shell fully interactive for Linux or Windows victim - nodauf/Girsh

GitHub
🌘 如何使用 netcat 與 GitHub Actions 進行互動式除錯
➤ 讓 GitHub Actions 在失敗時,也能任你 SSH 探索!
https://jacobtomlinson.dev/posts/2021/how-to-interactively-debug-github-actions-with-netcat/
本文介紹一種實驗性的除錯方法,教你如何透過建立一個反向 Shell (reverse shell),使 GitHub Actions 工作流程在執行失敗時,能讓你從本地端連線至 CI 執行器,進行即時互動式除錯。作者詳細說明瞭如何利用 `netcat` 接收連線、`ngrok` 進行 port forwarding,以及如何在 GitHub Actions 工作流程中設定指令來建立此反向 Shell。文末也補充了作者後續發現更簡便的 `tmate` Action 作為替代方案。
+ 這個方法很有趣,雖然有安全疑慮,但對於需要快速診斷 CI 失敗原因的場景,絕對是一
##GitHubActions #除錯 #netcat #ReverseShell
How to interactively debug GitHub Actions with netcat

Update: This was a fun experiment and I recommend you check out the post for a fun read on setting up reverse shells. But I’ve since discovered this awesome tmate action which lets you interactively debug in the browser or via SSH.

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks
https://gbhackers.com/bpfdoor-malware/

#Infosec #Security #Cybersecurity #CeptBiro #BPFDoor #Malware #ReverseShell #CompromisedNetworks

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight as a stealthy and dangerous tool for compromising networks.

GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Malware found on npm infecting local package with reverse shell

For the first time, RL researchers discover malicious locally-installed npm packages infecting other legitimate packages.

ReversingLabs
Hacker in Snowflake Extortions May Be a U.S. Soldier – Krebs on Security

Hacker in Snowflake Extortions May Be a U.S. Soldier – Krebs on Security

Mon dieu - Penelope is alright! Probably my favorite #reverseshell catcher for #linux targets. https://github.com/brightio/penelope

Highly recommend!

GitHub - brightio/penelope: Penelope Shell Handler

Penelope Shell Handler. Contribute to brightio/penelope development by creating an account on GitHub.

GitHub

Chinese APT Abuses VSCode to Target Government in Asia

[TR: Wait what? VSCode has a reverse shell feature?! Turn this off. Sounds like something proposed by another large company’s dev team recently.] #devtools #reverseshell #c2

https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/

Chinese APT Abuses VSCode to Target Government in Asia

A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage. A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage.

Unit 42

Why ara #poc for #vulnerability always #reverseshell ? I get that a reverse shell via RCE is a scary magic trick. But in practical #pentesting more often than not I'd rather have a single fire DNS lookup or HTTP request. It's much saver than dropping a shell into a customers environment and it does the job.

#informationsecurity