all InfoSec news
Gohide - Tunnel Port To Port Traffic Over An Obfuscated Channel With AES-GCM Encryption
Sept. 9, 2022, 12:30 p.m. | noreply@blogger.com (Unknown)
KitPloit - PenTest Tools! www.kitploit.com
Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption.
Obfuscation Modes
- Session Cookie HTTP GET (http-client)
- Set-Cookie Session Cookie HTTP/2 200 OK (http-server)
- WebSocket Handshake "Sec-WebSocket-Key" (websocket-client)
- WebSocket Handshake "Sec-WebSocket-Accept" (websocket-server)
- No obfuscation, just use AES-GCM encrypted messages (none)
AES-GCM is enabled by default for each of the options above.
Usage
root@WOPR-KALI:/opt/gohide-dev# ./gohide -h
Usage of ./gohide:
-f string
listen fake server -r x.x.x.x:xxxx (ip/domain:port) (default "0.0.0.0:8081")
-key openssl passwd -1 -salt ok | md5sum
aes encryption …
aes channel encryption golang obfuscated obfuscation port port forwarding traffic tunnel
More from www.kitploit.com / KitPloit - PenTest Tools!
Radamsa - A General-Purpose Fuzzer
3 days, 17 hours ago |
www.kitploit.com
Sr2T - Converts Scanning Reports To A Tabular Format
5 days, 17 hours ago |
www.kitploit.com
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Cyber Consultant
@ Frazer-Nash Consultancy | Gloucester, England, United Kingdom
Senior Vulnerability Management Reporting & Analytics Developer
@ Baker Hughes | IN-KA-BANGALORE-NEON BUILDING WEST TOWER
Product Security Architect
@ ChargePoint | Italy