How to disguise a covert channel with netcat like a harmless command
pentesting.academy
One of the most important steps after the post-exploitation is to cover our activities and maintain access to the target. In Linux, BSD or Unix we can easily disguise a process name to hide our covert operations. We can abuse the C function execv() to show one command but execute one completely different.
How to disguise a covert channel with netcat like a harmless command
How to disguise a covert channel with netcat…
How to disguise a covert channel with netcat like a harmless command
One of the most important steps after the post-exploitation is to cover our activities and maintain access to the target. In Linux, BSD or Unix we can easily disguise a process name to hide our covert operations. We can abuse the C function execv() to show one command but execute one completely different.