The described methods apply for both Linux and Windows. We are going to see both bind and reverse shells and also the difference between encrypted and not encrypted traffic. In this article we are going to see how to use socat in an imaginary scenario of attacker and victim, where we are trying to get a shell to the victim`s machine. We are not going to expand on how to use socat, but if you are interested in it, there are many available sources online to read. The reason behind it, putting it simple, is that netcat features is a subset of the socat features. Though there is this other tool called socat which you may or may not have heard before, that deserves that title a bit more. Well it is pretty known that the title of the Swiss Army Knife of Network Tools has been awarded to netcat.
0 Comments
Leave a Reply. |