Real Hackers Don’t Use Netcat Reverse Shells

preview_player
Показать описание
You NEED to know these TOP 10 CYBER SECURITY INTERVIEW QUESTIONS

WEBSITE

GITHUB

JOIN THE ELEVATE CYBER DISCORD CHANNEL

FOLLOW ME ON TWITTER

Discord: ElevateCyber#7398
Рекомендации по теме
Комментарии
Автор

You NEED to know these 10 interview questions if you want to get into cyber security pentesting:

elevatecyber
Автор

🎯 Key Takeaways for quick navigation:

00:13 🕵️ Real hackers don't rely on the common approach of using reverse shells for remote code execution.
01:51 🛡️ Attackers avoid using reverse shells because it's bad operational security (opsec) and exposes their IP address.
03:43 💼 Standard reverse shells make it difficult to manage multiple shells and control the timing of data retrieval.
05:20 🌐 Command and control (C2) frameworks offer a better alternative for attackers, providing control and abstraction layers to enhance opsec.
06:47 🛠️ Configuring C2 frameworks with custom settings is crucial for evading detection and maintaining opsec.

Made with HARPA AI

onhazrat
Автор

Good luck following my dynamic proxy chains.

Musician_Robert
Автор

I was about to ask about C2 servers lol I'm glad I finished watching the video entirely.

cruxnt
Автор

Yes, a couple of vids on C2 frameworks would be awesome! just got my hands on a trial copy of CS, and i'm following the Raphael Mudge vids (what a guy) but your insight is always appreciated.
I hadn't even thought of the possibility of coding one either.

SecYouTube(is that what we're calling it?) has little to no good info on this.
Your channel is fantastic.

alri
Автор

Great video man. I just found your channel but you are right, definitely not much quality content from people who ACTUALLY do this sh*t. Good work

slowmosheet
Автор

Yeah. But a hacker can use a long proxychain, a good vpn and a vm + a good hacking os (for example tails) to hide his ip and all activities while doing a reverse shell with nc. 🤷🏻‍♂️

fexvfx
Автор

that’s true however a real hacker can also pivot through numerous corupted servers and listening for a reverse shell. Once the backdoor and the rootkit are settled, the servers logs can be wiped, then good luck for the Blue Team…

tximistarelampago
Автор

Cobalt Strike and Armitage are both based on using the Metasploit Framework, which in return provide a meterpreter shell. C2 is good.

hellamean
Автор

Thank you for this video sir...very useful video about c2 framework and please make a video about c2 in dive deep it will be very useful sir

xrohit
Автор

Great super awesome video. It would be pretty cool if you do videos in the future where you perhaps show us how to use things like HTTP redirectors and whatnot. Very cool video. Most cybersec channels ignore this stuff

younesmohssen
Автор

Very interesting explanation and the analogy was perfect actually.

surkewrasoul
Автор

you are most underrated you tube channel🥺❤🔥

spctr
Автор

Wow... I really hadn't thought about that, they always teach you the basics in an easier-to-understand way and later, you get the whole story.
I am quite new on the security area, so that's very interesting to hear.

I would definitely like a more in-depth video about C2, 100%.
Good video, got a like and sub from me _/

scssrng
Автор

Finaly first time same one talking truth.

elprquex
Автор

Dude how you're going to connect to a c2 ? With a reverse shell. So this was nothing

elite_fitness
Автор

"32 feet per seconds, seconds!" will smith voice*

jayweezy
Автор

More on CS, and or the alternatives would be great

orca
Автор

I looked at Cobolt Strike after I got my cyber security degree and was just starting to get into Bug Bounty programs. The price is pretty high. It's like 5, 000.00 to have it

scarytruths
Автор

Netcat is a C2 just like Metasploit and CS.

flirtyemy