This is one "blog post" in a series of blog posts about developing an exploit, and post-exploitation toolkit, for a number of Cisco devices. These are notes written while solving the
PortShellCrypter offers up a scripting socket, and a simple utility (pscsh) that allows executing shell scripts on the remote end.
pscsh basically enables you to write a shell script, and have it be
I was writing a bunch of posts about automation and such using a tool by stealth named PortShellCrypter (PSC), and realised I had not written a post explaining what the fuck it is,
This year I attended probably one of my favourite conferences, SteelCon. I had not been since, I think, 2018 or 2019, for a variety of reasons including The Lost Years.
SteelCon is a
So you have built 'crashd' statically, as per a previous post.
You have ensured no OPSEC breaking strings are present. You have made your keys. You have your listening post server