{"id":8239,"date":"2023-01-05T09:48:06","date_gmt":"2023-01-05T09:48:06","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=8239"},"modified":"2023-04-16T10:47:45","modified_gmt":"2023-04-16T10:47:45","slug":"could-hoaxshell-create-a-hidden-windows-reverse-shell","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/could-hoaxshell-create-a-hidden-windows-reverse-shell\/","title":{"rendered":"Could Hoaxshell create a hidden Windows Reverse Shell?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/1-1.png\" alt=\"\" class=\"wp-image-8240\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Greetings, everyone! In this post, I&#8217;ll be providing a concise guide on <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">hoaxshell<\/mark><\/strong> &#8211; a newly developed Windows <a href=\"https:\/\/reconcybersecurity.com\/could-linux-systems-that-use-shc-be-at-risk-of-a-new-malware-strain-targeting-their-cryptocurrency-miners-cyber-security-recon-force\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">reverse shell<\/mark><\/strong><\/a> undetectable to <mark style=\"background-color:rgba(0, 0, 0, 0);color:#009dff\" class=\"has-inline-color\"><a href=\"https:\/\/reconcybersecurity.com\/what-is-nmap-and-why-its-so-important-in-cyber-security-recon-cyber-security\/\"><strong>Windows Defender<\/strong><\/a> <\/mark>created by t3l3machus. Let&#8217;s get started!<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Setup<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color\">To install the necessary dependencies for any project without leaving my system in disarray, I recommend setting up a Python virtual environment first. For this, you will need Git and Python3 installed. To use the venv module on your machine, execute the following command:  Sudo apt install python3-venv.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Let&#8217;s create a virtual environment, clone the <strong>hoaxshell<\/strong> repository, and install the mandatory <a href=\"https:\/\/reconcybersecurity.com\/python-programming-course\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">Python<\/mark><\/strong><\/a> packages with this command.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/2-1.png\" alt=\"\" class=\"wp-image-8241\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Verify that the <em>hoaxshell<\/em> repository works properly by executing the following command and accessing the help menu<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/3-1.png\" alt=\"\" class=\"wp-image-8243\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/4.png\" alt=\"\" class=\"wp-image-8244\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Is it possible to craft reverse shell payloads with Hoaxshell?<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color\">Utilizing hoaxshell on our device, we can create some windows reverse shells that will be impossible to detect. To produce a conventional reverse shell payload and start an HTTP listener with <em>hoaxshell<\/em> (standard port 8080), execute the command below<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/5.png\" alt=\"\" class=\"wp-image-8245\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">This is what your terminal should display<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/6.png\" alt=\"\" class=\"wp-image-8246\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">On the Windows target box, executing a particular <a href=\"https:\/\/reconcybersecurity.com\/ctf-challenge-course\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-purple-color\">PowerShell<\/mark><\/strong><\/a> command is necessary to acquire a reverse shell. To have an understanding of what the said command is executing, type in &#8216;raw payload&#8217; into the <em>hoaxshell<\/em> prompt and press enter.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/7.png\" alt=\"\" class=\"wp-image-8247\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Within a <strong><a href=\"https:\/\/reconcybersecurity.com\/ctf-challenge-course\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">PowerShell<\/mark><\/a><\/strong> terminal window on the target Windows machine, copy and run the PowerShell payload.<\/p>\n\n\n\n<div class=\"wp-block-cover is-light\" style=\"min-height:111px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-8248\" alt=\"\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/8.png\" data-object-fit=\"cover\"\/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-black-color has-text-color\">Assuming no errors were thrown, you should have gotten a call-back to your reverse shell on your attacking machine. <strong>Hoaxshell<\/strong> confirms the payload was valid and you now have an uninterrupted connection &#8211; and most importantly, Microsoft Defender is oblivious to the malicious activity for the time being (which is awesome)!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/10.png\" alt=\"\" class=\"wp-image-8250\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">With <strong>Hoaxshell<\/strong>, you can perform many awesome functions like encrypted transit, reconnect disconnected sessions, and send traffic via <a href=\"https:\/\/reconcybersecurity.com\/how-to-install-and-use-ngrok-2021-n4h\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-cyan-blue-color\">Ngrok<\/mark><\/strong><\/a> or LocalTunnel. Explore these impressive capabilities on your own! There you have it: an invisible reverse shell compatible with the all-new Windows 11 OS. Time to <a href=\"https:\/\/reconcybersecurity.com\/\"><strong><em><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">hack!<\/mark><\/em><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Greetings, everyone! In this post, I&#8217;ll be providing a concise guide on hoaxshell &#8211; a newly developed Windows&hellip;\n","protected":false},"author":1,"featured_media":10767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,55],"tags":[240,351,352,353,354,355,356,357,90,57],"class_list":{"0":"post-8239","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-hacking-tools","9":"tag-cyber-security","10":"tag-hoaxshell","11":"tag-hoaxshell-connection","12":"tag-hoaxshell-hack","13":"tag-hoaxshell-power-shell","14":"tag-hoaxshell-reverse-shell","15":"tag-hoaxshell-setup","16":"tag-hoaxshell-use","17":"tag-how-to-use-metasploit","18":"tag-social-media-hacking"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=8239"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8239\/revisions"}],"predecessor-version":[{"id":10768,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8239\/revisions\/10768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10767"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=8239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=8239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=8239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}