Skip to Content
How to Hack Like a Ghost
book

How to Hack Like a Ghost

by Sparc Flow
May 2021
Intermediate to advanced
264 pages
6h 31m
English
No Starch Press
Content preview from How to Hack Like a Ghost

3 Let There Be Infrastructure

In this chapter we’ll set up the backend attacking infrastructure as well as the tooling necessary to faithfully reproduce and automate almost every painful aspect of the manual setup. We’ll stick with two frameworks: Metasploit for Linux targets and SILENTTRINITY for Windows boxes.

Legacy Method

The old way to set up an attacking infrastructure would be to install each of your frameworks on a machine and place a web server in front of them to receive and route traffic according to simple pattern-matching rules. As illustrated in Figure 3-1, requests to /secretPage get forwarded to the C2 backend, while the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How to Hack Like a Legend

How to Hack Like a Legend

Sparc Flow
Hands on Hacking

Hands on Hacking

Matthew Hickey, Jennifer Arcuri

Publisher Resources

ISBN: 9781098128944