mirror of https://github.com/hak5/omg-payloads.git
Update README.md
parent
219288b345
commit
a477bcea47
|
@ -13,13 +13,14 @@ Unlike ReverseCable, ReverseCableSSL offers encrypted traffic via OpenSSL.</p>
|
|||
|
||||
**Instruction:**
|
||||
<p>!!!Insert the IP of your attacking machine & PORT into the payload at the beginning!!!<br>
|
||||
1. Create key.pem & cert.pem like so: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes<br>
|
||||
> It will ask for information about the certificate - Insert whatever you want.<br>
|
||||
1. Create key.pem & cert.pem like so: <br>
|
||||
> openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes<br>
|
||||
It will ask for information about the certificate - Insert whatever you want.<br>
|
||||
|
||||
2. For catching the shell you need to start a listener, which supports encrypted traffic.<br>
|
||||
I recommend openssl itself or ncat - Example syntax for both:<br>
|
||||
> openssl s_server -quiet -key key.pem -cert cert.pem -port [Port Number] <br>
|
||||
> ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem</p>
|
||||
> `openssl s_server -quiet -key key.pem -cert cert.pem -port [Port Number]` <br>
|
||||
> `ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem`</p>
|
||||
|
||||
3. Plug in Cable.
|
||||
|
||||
|
|
Loading…
Reference in New Issue