DNSCat pcap analysis
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Ikiwa una pcap yenye data inayokuwa imefichwa na DNSCat (bila kutumia usimbuaji), unaweza kupata maudhui yaliyofichwa.
Unahitaji tu kujua kwamba bytes 9 za kwanza si data halisi bali zinahusiana na mawasiliano ya C&C:
Kwa maelezo zaidi: https://github.com/jrmdev/ctf-writeups/tree/master/bsidessf-2017/dnscap https://github.com/iagox86/dnscat2/blob/master/doc/protocol.md
Kuna script inayofanya kazi na Python3: https://github.com/josemlwdf/DNScat-Decoder
Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)