Reverse Shell.

Slides:



Advertisements
Similar presentations
Operating Systems (CSCI2413) Lecture 2 Overview phones off (please)
Advertisements

LECTURE 1 CMSC 201. Overview Goal: Problem solving and algorithm development. Learn to program in Python. Algorithm - a set of unambiguous and ordered.
Slope intercept form of an equation
Information flow inside the computer IT skills: none IT concepts: computer components (input devices, output devices, memory, storage and CPU), program.
Input-output and Communication Prof. Sin-Min Lee Department of Computer Science.
UNIX Chapter 01 Overview of Operating Systems Mr. Mohammad A. Smirat.
AVR32 GPIO CS-423 Dick Steflik. What is a GPIO GPIO – General Purpose Input/Output  Flexible software control digital signal  Each GPIO represents a.
Altera DE2 Board and Quartus II Software ECE 3450 M. A. Jupina, VU, 2014.
How to install the Zelle graphics package
Processor Types And Instruction Sets Barak Perelman CS147 Prof. Lee.
Installing software on personal computer
Copyright © 2014, 2015 William R. Vaughn All rights reserved William R. Vaughn.
Input/OUTPUT [I/O Module structure].
Week 7 Working with the BASH Shell. Objectives  Redirect the input and output of a command  Identify and manipulate common shell environment variables.
CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT I/O Redirection.
CSC 322 Operating Systems Concepts Lecture - 4: by Ahmed Mumtaz Mustehsan Special Thanks To: Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Segmentation & O/S Input/Output Chapter 4 & 5 Tuesday, April 3, 2007.
BASIC INPUT AND OUTPUT INTERFACING.  8085A communicate with outside world using the I/O devices.  Since memory and I/O devices share the system bus,
Most modern operating systems incorporate these five components.
1 Dryad Distributed Data-Parallel Programs from Sequential Building Blocks Michael Isard, Mihai Budiu, Yuan Yu, Andrew Birrell, Dennis Fetterly of Microsoft.
File I/O Static void Main( ) {... } data. Topics I/O Streams Reading and Writing Text Files Formatting Text Files Handling Stream Errors File Pointers.
Linux+ Guide to Linux Certification, Third Edition
Chapter Five Advanced File Processing. 2 Objectives Use the pipe operator to redirect the output of one command to another command Use the grep command.
1 Week 2 The Crunchy Shell to the Soft and Chewy Kernel… Sarah Diesburg 8/3/2010 COP4610 / CGS5765.
Linux+ Guide to Linux Certification Chapter Eight Working with the BASH Shell.
Analysis of SQL injection prevention using a filtering proxy server By: David Rowe Supervisor: Barry Irwin.
1 Operating Systems and Using Linux Topics What is an Operating System? Linux Overview Frequently Used Linux Commands Some content in this lecture added.
The Socket Interface Chapter 21. Application Program Interface (API) Interface used between application programs and TCP/IP protocols Interface used between.
CS162B: Pipes Jacob T. Chan. Pipes  These allow output of one process to be the input of another process  One of the oldest and most basic forms of.
Lesson 1 Operating Systems, Part 1. Objectives Describe and list different operating systems Understand file extensions Manage files and folders.
C o n f i d e n t i a l 1 Course: BCA Semester: III Subject Code : BC 0042 Subject Name: Operating Systems Unit number : 1 Unit Title: Overview of Operating.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
Distributed System Concepts and Architectures Services
Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.
Eric Tryon Brian Clark Christopher McKeowen. System Architecture The architecture can be broken down to three different basic layers Stub/skeleton layer.
A.Abhari CPS1251 Topic 1: Introduction to Computers Computer Hardware Computer components Connecting Computers Computer Software Operating System (OS)
Working with Hadoop. Requirement Virtual machine software –VM Ware –VirtualBox Virtual machine images –Download from Cloudera (Founded by leaders in the.
CSCI 330 UNIX and Network Programming
Install CB 1.8 on Ubuntu. Steps Followed Install Ubuntu (Ubuntu LTS) on Virtual machine – (VMware Workstation) (
OS Labs 2/25/08 Frans Kaashoek MIT
CS 140 Lecture Notes: Virtual MachinesSlide 1 Process Abstraction Instruction Set Registers MMU I/O Devices Physical Memory Virtual Memory System Calls.
Chapter Eight Exploring the UNIX Utilities. 2 Lesson A Using the UNIX Utilities.
ECE 456 Computer Architecture Lecture #9 – Input/Output Instructor: Dr. Honggang Wang Fall 2013.
Software. Introduction n A computer can’t do anything without a program of instructions. n A program is a set of instructions a computer carries out.
Operating Systems and Using Linux Courtesy of John Y. Park 1.
+ Auto-Testing Code for Teachers & Beginning Programmers Dr. Ronald K. Smith Graceland University.
Linux Administration Working with the BASH Shell.
Week 3 Redirection, Pipes, and Background
Process API COMP 755.
Shell Features CSCI N321 – System and Network Administration
Topics discussed in this section:
UNIX System Overview.
Operating Systems Overview
Metasploit a one-stop hack shop
What is an Operating System?
Changing WRF input files (met_em…) with MATLAB
CS 140 Lecture Notes: Virtual Machines
Chapter 3. Basic Dynamic Analysis
Do-more Technical Training
CS703 - Advanced Operating Systems
Programming Assignment # 2 – Supplementary Discussion
IPC Prof. Ikjun Yeom TA – Hoyoun
Yung-Hsiang Lu Purdue University
Introduction to Operating Systems
CS 140 Lecture Notes: Virtual Machines
Topics discussed in this section:
Lecture 5 review At the beginning of a program, what is the value of fd after ‘fd = open(…);’ is executed? What is file no 0? What is file no 1? What is.
Virtual Private Network
Attacks on TCP.
SHELLSHOCK ATTACK.
Presentation transcript:

Reverse Shell

Overview File descriptor Standard input and output devices Redirecting standard input and output How reverse shell works

The Idea of Reverse Shell

File Descriptor Execution Result

File Descriptor Table

Standard I/O Devices Execution Result

Redirection An example Redirecting to file Redirecting to file descriptor

How Is Redirection Implemented? Creates a copy of the file descriptor oldfp, and then assign newfd as the new file descriptor.

The Change of File Descriptor Table

Redirecting Output to TCP Connections

Redirecting Input to TCP Connections

Redirecting to TCP from Shell Redirecting Input Redirecting Output Running a TCP server on 10.0.2.5 $ nc –l 9090

Note /dev/tcp is not a real folder: it dos not exist It is a built-in virtual file/folder for bash only Redirection to /dev/tcp/… can only be done inside bash

Reverse Shell Overview

Redirecting Standard Output On Attacker Machine (10.0.2.70) On Server Machine

Redirecting Standard Input & Output On Server Machine

Redirecting Standard Error, Input, & Output On Server Machine

Reverse Shell via Code Injection Reverse shell is executed via injected code Can’t assume that the target machine runs bash Run bash first:

Summary Reverse shell works by redirecting shell program’s input/output Input and output of a program can be redirected to a TCP connection The other end of the TCP connection is attacker It is a widely used technique by attackers