Update README.md

pull/29/head
0iphor13 2022-04-11 12:14:16 +02:00 committed by GitHub
parent 219288b345
commit a477bcea47
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 5 additions and 4 deletions

View File

@ -13,13 +13,14 @@ Unlike ReverseCable, ReverseCableSSL offers encrypted traffic via OpenSSL.</p>
**Instruction:**
<p>!!!Insert the IP of your attacking machine & PORT into the payload at the beginning!!!<br>
1. Create key.pem & cert.pem like so: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes<br>
> It will ask for information about the certificate - Insert whatever you want.<br>
1. Create key.pem & cert.pem like so: <br>
> openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes<br>
It will ask for information about the certificate - Insert whatever you want.<br>
2. For catching the shell you need to start a listener, which supports encrypted traffic.<br>
I recommend openssl itself or ncat - Example syntax for both:<br>
> openssl s_server -quiet -key key.pem -cert cert.pem -port [Port Number] <br>
> ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem</p>
> `openssl s_server -quiet -key key.pem -cert cert.pem -port [Port Number]` <br>
> `ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem`</p>
3. Plug in Cable.