Covert Channel: The Hidden Network

Covert Channel: The Hidden Network

Generally, the hacker uses a hidden network to escape themselves from firewall and IDS such. In this post, you will learn how to steal information from the target machine through the undetectable network. Such type of network is known as a covert channel which seems as generic traffic to any network monitor device/application and network admin. It could be considered as steganography, but it is not exactly steganography. Two endpoint users can use the covert channel for undetectable communication from network admin.

The red teamers use covert channels for data exfiltration in red teaming operations through a legitimate network and the data exfiltration is a process of secretly sharing data between two endpoints.

Table of Content

What is Covert channel

  • Type of covert channel

Covert channel attack using tunnelshell

  • What is Tunnelshell
  • Covert ICMP Channel
  • Covert HTTP Channel
  • Covert DNS Channel

Full Article Read Here

要查看或添加评论,请登录

Harshit Rajpal的更多文章

  • Make your own Linux 64-bit shellcodes - Part 1

    Make your own Linux 64-bit shellcodes - Part 1

    Shellcodes are machine instructions which are used as a payload in the exploitation of a vulnerability. An exploit is a…

    3 条评论
  • HiveNightmare Exploitation

    HiveNightmare Exploitation

    Introduction CVE-2021-36934 also known as SeriousSAM and HiveNightmare vulnerability was discovered by Jonas Lykkegaard…

    1 条评论
  • Android Hooking and SSLPinning Bypass and more using Objection Framework

    Android Hooking and SSLPinning Bypass and more using Objection Framework

    Objection is runtime mobile exploration toolkit built on top of frida which is used in Android and iOS pentesting. We…

  • Android Application Framework: Beginner’s Guide

    Android Application Framework: Beginner’s Guide

    Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software…

    2 条评论
  • uCertify's CySA+ (CS0-001) Experience

    uCertify's CySA+ (CS0-001) Experience

    I have always been skeptical when it comes to online learning. I don't know but I never actually accepted the idea of…

  • Hack the Box: Help Walkthrough

    Hack the Box: Help Walkthrough

    Published on Hacking Articles (22 June) Help is a recently retired CTF challenge VM on Hack the Box and the objective…

  • Hack The Raven 2: CTF challenge

    Hack The Raven 2: CTF challenge

    Hello everyone and welcome to yet another CTF challenge walkthrough. This time we’ll be putting our hands on Raven 2.

    3 条评论
  • Hack the Box: Poison walkthrough

    Hack the Box: Poison walkthrough

    Hello everyone and welcome to yet another CTF challenge from hack the box, called ‘Poison,’ which is available online…

    1 条评论
  • Master guide to Linux Privilege Escalation by Hacking Articles

    Master guide to Linux Privilege Escalation by Hacking Articles

    Below is a collection of all the articles we have practically performed and are the best methods to get triple 0s (if…

    3 条评论
  • Hack the CH4INRULZ : 1.0.1 (CTF challenge)

    Hack the CH4INRULZ : 1.0.1 (CTF challenge)

    Hello readers and welcome to another CTF challenge. This VM is made by Frank Tope as you’ll see in the very homepage on…

    3 条评论

社区洞察

其他会员也浏览了