Posts
Information security software solutions for everyone
Python malware development: creating a reverseShell part 1
- Get link
- X
- Other Apps
WINDOWS SYSTEM PROGRAMMING WITH C/C++
- Get link
- X
- Other Apps
Windows System Architecture History Windows was originally a 16-bit graphical layer for MS-DOS that was written by Microsoft.As it grew, it gained the ability to handle 32-bit programs and eventually became totally 32-bit when Windows NT and 2000 came out. After Windows 95, Microsoft began to remove dependencies on DOS and finally fully implemented the separation in Windows 2000. Windows has many advanced features as well as many platform specific problems. It possesses an Application Programming Interface that consists of thousands of mostly undocumented GUI functions as well as having varying degrees of MS-DOS compatibility. Additionally, with the advent of NT (New Technology), Windows relies completely on the NT kernel instead of its MS-DOS subsystem, the NT kernel is capable of emulating the necessary DOS functionality. In addition to the NT kernel, Microsoft has also introduced many API wrappers, such as the MFCs (Microsoft Foundation Classes), COM (Component Object Model), an...
WRITING A C++ SERVER AND CLIENT SOCKET
- Get link
- X
- Other Apps
Setting Up the Server Step 1: Initialize Winsock In the server, the first step is to initialize the Winsock library. This involves loading the DLL and setting up the necessary variables. The following code demonstrates how to achieve this: #include <iostream> #include <winsock2.h> int main() { // Initialize WSA variables WSADATA wsaData; int wsaerr; WORD wVersionRequested = MAKEWORD(2, 2); wsaerr = WSAStartup(wVersionRequested, &wsaData); // Check for initialization success if (wsaerr != 0) { std::cout << "The Winsock dll not found!" << std::endl; return 0; } else { std::cout << "The Winsock dll found" << std::endl; std::cout << "The status: " << wsaData.szSystemStatus << std::endl; } return 0; } Step 2: Create a Socket Next, we create a socket to handle communication. The socket() function is used f...
DEVELOPING A PORTSCANNER IN PYTHON
- Get link
- X
- Other Apps
Developing a port scanner in python Port scanning is a scanning method for determining which ports on a network device are open, whether it's a server, a router, or a regular machine. A port scanner is just a script or a program that is designed to probe a host for open ports. In this tutorial, you will be able to make your own port scanner in Python using the socket library. The basic idea behind this simple port scanner is to try to connect to a specific host (website, server, or any device connected to the Internet/network) through a list of ports. If a successful connection has been established, that means the port is open. For instance, when you loaded this web page, you made a connection to this website on port 80 . Similarly, this script will try to connect to a host but on multiple ports. These kinds of tools are useful for hackers and penetration testers, so don't use this tool on a host that you don't have permission to test! Optionally, you...
Creating a Reverse Shell in Python
- Get link
- X
- Other Apps
lntroduction There are many ways to gain control over a compromised system. A common practice is to gain interactive shell access, which enables you to try to gain complete control of the operating system. However, most basic firewalls block direct remote connections. One of the methods to bypass this is to use reverse shells. A reverse shell is a program that executes local cmd.exe (for Windows) or bash/zsh (for Unix-like) commands and sends the output to a remote machine. With a reverse shell, the target machine initiates the connection to the attacker machine, and the attacker's machine listens for incoming connections on a specified port; this will bypass firewalls. The basic idea of the code we will implement is that the attacker's machine will keep listening for connections. Once a client (or target machine) connects, the server will send shell commands to the target machine and expect output results. full code on github:https://github.com/theKlaytonLabs...