Reverse Shells

Image
>  A reverse shell is a shell session established on a connection that is initiated from a remote machine, not from the localhost. Attackers who successfully exploit a remote command execution vulnerability can use a reverse shell to obtain an interactive shell session on the target machine and continue their attack. A reverse shell (also called a connect-back shell) can also be the only way to gain remote shell access across a NAT or firewall. Let’s see how reverse shells work in practice and what you can do to prevent them. How a Reverse Shell Works To establish a typical remote shell, a machine controlled by the attacker connects to a remote network host and requests a shell session – this is called a bind shell. But what if the remote host is not directly accessible, for example, because it has no public IP or is protected by a firewall? In this situation, a reverse shell might be used, where the target machine initiates an outgoing connection to a listening network host,

Setup Proxychains in Linux

What is Proxychains?

Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any other SOCKS4, SOCKS5 or HTTP proxies. It is an open-source project for GNU/Linux systems.

Essentially, you can use ProxyChains to run any program through a proxy server. This will allow you to access the Internet from behind a restrictive firewall, hide your IP address, run applications like SSH/ telnet/wget/FTP and Nmap through proxy servers, and even access your local Intranet from outside through an external proxy.

Proxychains even allows you to use multiple proxies at once by “chaining” the proxies together and to use programs with no built-in proxy support through a proxy.

Setup Proxy in linux:

Fire up your Linux Terminal

write the commands

$ sudo apt-get install tor

It will install the tor service in your kali machine.

After that you need to open the proxychain.conf file to edit it.

$nano /etc/proxychains.conf

it will open the file in the editor, so that you can edit the files.

here, you need to change the confriguation

  1. remove the comment from dynamic chain
  2. Place the comment in strict chain and random chain
  3. write socks5 127.0.0.1 9050 in last line of proxy list

and save the file.

now use these command

$service tor restart

$proxychains firefox www.bing.com

as you can see the proxychain service is start, so now let's go to the dns leak test to check our ip.

here you can see my ip.

 

Thankyou!!!

  

Comments

Popular posts from this blog

OTP Bypassing

Installing I2P Service