Custom Reverse Shell Backdoor for WIN/LIN/MAC
Python in penetration testing and you may use or tune the code for a real world case. Plus you will be aware of the effectiveness of client-side attack and the importance of programming your own weapon where other tools will fail in such a tough scenario.
Example of how this works:
Attacker Machine >IP address : 10.0.2.15/24 >OS: BackTrack 5 R3 >Python Version: 2.6
Victim Machine >IP address : 192.168.1.15/24 >OS: Windows 7 SP1 32 bit >Zone Alarm Firewall and anti-virus installed (free version) >Python Version: 2.7 (installed for demonstration only)
Network Infrastructure >Pfsense Firewall with SNORT IDS/IPS integrated service >Pfsense is NATing the victim machine [192.168.1.15] to its WAN interface [10.0.2.1] >2xVirtual switches created by VBox
Building the machines from scratch inside VBox is out of our scope in this article; however, I have to briefly show you the configuration in case someone would like to replicate the scenario.
If you like this video, visit his instagram page @the.red.team. If you want this tool or other tools he has them made, DM him and he will be happy to help.