Skip to content
This repository has been archived by the owner on Jul 1, 2023. It is now read-only.

A post-exploitation script that sniffs for POST req data and covertly sends it back to the attackers server using TCP SYN ISN

Notifications You must be signed in to change notification settings

M507/Covert-Channel-by-Exploiting-HTTP-Post

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

Covert-Channel-by-Exploiting-HTTP-Post

"Information theft through covert channel by exploiting HTTP Post method"

The purpose of the tool is exploiting HTTP POST requests and stealing the data being sent on the payload of every POST request. It helps collecting credentials. In addition to that, it sends the data covertly, using the ISN in TCP SYN packets; thus, it is almost impossible to detect it by looking at the traffic without using IDS/IPS tools which are usually not used in competitions.

My inspiration was this paper: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6616180

About

A post-exploitation script that sniffs for POST req data and covertly sends it back to the attackers server using TCP SYN ISN

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages