Skip to content

ykankaya/ninja_shell

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ninja_shell v2.1

Alt text

Raw socket shell with AES256-GCM, using Port Knocking technique( https://en.wikipedia.org/wiki/Port_knocking ) using specific tcp flags ,FIN,URG and PSH.

Raw socket ?

Raw mode is basically there to allow you to bypass some of the way that your computer handles TCP/IP. Rather than going through the normal layers of encapsulation/decapsulation that the TCP/IP stack on the kernel does, you just pass the packet to the application that needs it. No TCP/IP processing -- so it's not a processed packet, it's a raw packet. The application that's using the packet is now responsible for stripping off the headers, analyzing the packet, all the stuff that the TCP/IP stack in the kernel normally does for you.

A raw socket is a socket that takes packets, bypasses the normal TCP/IP processing, and sends them to the application that wants them.

Unless you're a programmer, a kernel hacker, or really really into security, you will most likely not need to deal much with these. But it's good to know what they are, in case you find yourself in one of the above scenarios.

https://en.wikipedia.org/wiki/Raw_socket

Install OpenSSL lib

Deb based linux follow:

# apt-get install openssl-dev

or

# apt-get install ssldev or ssl-dev

on rpm based linux follow:

# yum install openssl-devel

To run you need use root because raw socket need:

To compile

# make

on server machine:

# bin/server

on client machine:

# bin/client the_SERVER_IP_addr (note don't use localhost or 127.0.0.1 put real ip addr, this version suport only IPV4)

To change keys edit /src/server.c and /src/client.c, and compile...

About

Port Knocking technique with AES256-GCM

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 99.0%
  • Makefile 1.0%