Building a Hardened Shell For Attack/Defend CTF Supremacy

Why do this? After playing the Pros versus Joes CTF on multiple occasions, a common tactic employed by the red team is to add malicious entries to bashrc, profile, and such. This is a common and documented persistence technique: https://attack.mitre.org/techniques/T1156/ Bash and other shells can be used to create sockets if they are configured/compiled to …

Continue reading Building a Hardened Shell For Attack/Defend CTF Supremacy