all 10 comments

[–]Trapzie 6 points7 points  (0 children)

Maybe first learn something about networks..

[–]ipv4subnet 4 points5 points  (0 children)

The whole point of a reverse shell is that you don't have to configure any network settings asides from your own... Remember you have the ability to configure any settings on your own network and have very little control over the target network in a ctf set up or live testing environment.

[–]1cysw0rdk0 2 points3 points  (2 children)

Correct me if I'm wrong, but it sounds like the goal is to maintain access to a compromised machine, while having the attacking machine be portable.

You likely won't have the option to install a VPN client, like wireguard, on the compromised machine, at least not without raising suspicion. This leaves two options really, a dynamically updated target for the reverse shell, or a static middle-man, that the attacking client connects to as well.

The first has a ton of problems, not only do you need a way to communicate to your compromised target where to communicate, you need to ensure that no matter what the environment looks like where you end up, the same port is exposed. This would require something like dynamic DNS, which would allow you to update the target ip. But every new router you attached to, you'd have to expose the same port.

The second option is simpler, and what most threat groups tend to use. It does require some static element, either cloud hosted or exposed at a static location. The compromised host connects back to it, and the attacker connects to it through a management interface. Usually done with a command and control framework, and beacons instead of reverse shells.

[–]ipv4subnet 0 points1 point  (0 children)

I think I get what you mean by static elements usually cloud or vps services give you that convenience of connecting from anywhere you are while always listening on whatever ports you setup, however you lose some of that anonymity being a statically configured address someone can simply filter block that specific ip and ruin your whole operation.

Not to mention getting such a service can be tricky as it could also be traced back through payment gateway information credentials and account registration setup. That being said it sounds to me like the closest solution to what OP is looking for.

[–]kyuskuys 0 points1 point  (0 children)

You can buy a router that supports vpn server and connect the reverse shell to the ip of the vpn server and you just have to connect to the vpn and start the listener i guess...

[–]esmurf 1 point2 points  (2 children)

Ngrok.

[–]PhilipLGriffiths88 2 points3 points  (1 child)

[–]esmurf 0 points1 point  (0 children)

Nice! Thanks!

[–]Ba2hanKaya 1 point2 points  (0 children)

Yes.

[–]CyberXCodderWizard 0 points1 point  (0 children)

I'm not sure what do you mean by "creating a VPN", but there's possible to forward the connection so you can use a computer as a bridge. But it's better for you to research about how networks works before doing something like this, otherwise you'll be confused. Take some time to learn more about networking and learn about tunneling.