What is the best approach?

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic
undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic
undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?

A.
Install Cryptcat and encrypt outgoing packets from this server.

B.
Install and use Telnet to encrypt all outgoing traffic from this server.

C.
Use Alternate Data Streams to hide the outgoing packets from this server.

D.
Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection
Systems.

Explanation:
Cryptcat enables us to communicate between two systems and encrypts the communication between them withtwofish.
http://null-byte.wonderhowto.com/how-to/hack-like-pro-create-nearly-undetectable-backdoor-withcryptcat-0149264/



Leave a Reply 0

Your email address will not be published. Required fields are marked *