Friday, September 30, 2016

NETCAT / 6 - Ncat - Encryption and Authentication


- Layout topology for this exercise:

- In this exercise encryption is used to avoid eavesdropping and IDS detection. Also, authentication ensures that only the desired partner is able to establish the connection.

- The command structure is similar to the usual bind shell with the only differences of using ncat for the command, --ssl for encryption, and --allow for authentication.

- Windows specifies that the only allowed host to communicate via ncat with him will be the Kali machine, and also that the connection will be encrypted:

- Kali launches the connection also with --ssl encryption: