Hello, everyone. Stealth is a large part of any successful hack; if we don’t get noticed, we’re much less likely to be caught. In these next few articles, we’ll be building a shell based on keeping us hidden from a firewall. There are many ways to stay hidden from a firewall, but we’ll only be incorporating a couple into our shell. This article will outline and explain these evasion concepts and techniques.

The two techniques that we’ll be using are rather simple: well-known ports and trust exploitation. We’ll explain these concepts deeper.

Using Well-Known Ports for Evasion

Ports are used… more

Go to Source


Comments are closed.