Ninja Shell - Port Knocking Technique With AES256-GCM


Raw socket shell with AES256-GCM, using Port Knocking technique( https://en.wikipedia.org/wiki/Port_knocking ) using specific tcp flags ,FIN,URG and PSH.

Raw socket ?
Raw mode is basically there to allow you to bypass some of the way that your computer handles TCP/IP. Rather than going through the normal layers of encapsulation/decapsulation that the TCP/IP stack on the kernel does, you just pass the packet to the application that needs it. No TCP/IP processing -- so it's not a processed packet, it's a raw packet. The application that's using the packet is now responsible for stripping off the headers, analyzing the packet, all the stuff that the TCP/IP stack in the kernel normally does for you.
A raw socket is a socket that takes packets, bypasses the normal TCP/IP processing, and sends them to the application that wants them.
Unless you're a programmer, a kernel hacker, or really really into security, you will most likely not need to deal much with these. But it's good to know what they are, in case you find yourself in one of the above scenarios.

Install OpenSSL lib
Deb based linux follow:
# apt-get install openssl-dev
or
# apt-get install ssldev or ssl-dev
on rpm based linux follow:
# yum install openssl-devel

To run you need use root because raw socket need:
To compile
# make
on server machine:
# bin/server
on client machine:
# bin/client the_SERVER_IP_addr
To change keys edit /src/server.c and /src/cleint.c, and compile...


Ninja Shell - Port Knocking Technique With AES256-GCM Ninja Shell - Port Knocking Technique With AES256-GCM Reviewed by Lydecker Black on 10:17 AM Rating: 5