Gaining access with reverse-shell-over-tor
Last updated
Last updated
We assume that we are able to execute commands in Victim1 in some way.
In order to obtain a reverse shell preserving anonymity, we will use reverse-shell-over-tor from Offensive Tor Toolkit. As shown in the following illustration, the attacker will publish a Hidden Service so that the victim can send the reverse shell to it.
The attacker will publish a Hidden Service so that the attacker can start a connection:
In order to handle the connection, the attacker will start a listener with netcat:
We have to launch a reverse shell from the Victim to the Hidden Service. The tool we need is reverse-shell-over-tor
. The only parameter we need is the address and port in which the Hidden Service is listening.
Once the victim connects with reverse-shell-over-tor
, a /bin/sh
shell is launched.
The attacker could change the shell binary by using the parameter -reverse-shell-program
.