Secondary Categories: 02-Defense Evasion, 02-Persistence
Watershell
This amazing tool allows an attacker to run commands by bypassing iptables
or other linux packet filter
. The way this tool works is by sniffing for UDP or TCP datagrams on a specified port and runs the command if a keyword is found in the packet.
The keywords used in the original repo is run and status.
Resources:
Also Check Out:
- PLACEHOLDER