Jul 6, 2017
After an attacker is successful in getting a payload onto a system and getting it to run they still have to worry about whether there will be a successful connection out to a command and control server. There are a number of different transport mechanisms that can be utilized including direct TCP connections, pivoting through a proxy, DNS, or even ICMP to name a few. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) details some of these transports that can be used to establish remote command and control over a system.
LINKS:
Dnscat - https://github.com/iagox86/dnscat2
Gcat - https://github.com/byt3bl33d3r/gcat
PowerShellICMP - https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellIcmp.ps1
icmpsh - https://github.com/inquisb/icmpsh
Week of PowerShell Shells - http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html