London Stack Smashers

Shellter will be presented in the upcoming event of london stack smashers IT security group.

If you are planning to come over,  then bring some interesting questions and/or suggestions. I will happily consider any of those.

However, if you are planning to come over to tell me that what I do makes me a bad person; I would suggest that you skip my presentation, so that the rest of the people can enjoy it.

See you there,
kyREcon

Using domain names as LHOST

A lot of people have been asking me to support domain names directly from Shellter in the LHOST parameter.
This is something that I am planning to implement in the upcoming version (v5.2) of Shellter. If you need this right now, then you can generate the payload in raw format from metasploit and feed it to Shellter.
However, this is also a good opportunity to make some things clear about setting domain names as LHOST parameter at the various payloads that support reverse connection back to the attacker’s server.
While some people might be aware of what actually happens in the background during the payload generation in metasploit regarding this matter, it also came to my attention that not everyone is.
Continue reading Using domain names as LHOST

AV Evasion Artware