There's more...

Another simpler way to bypass network security solutions is to use the HTTP SSL Certificate Impersonation auxiliary module to impersonate an SSL certificate, and then use it to encrypt the communication between the payload and the listener.

First, we need to impersonate a certificate, which means that we will copy a remote SSL certificate and create a local (self-signed) version, using the information from the remote version. In this recipe, we will impersonate Symantec's certificate:

root@kali:~# msfconsole -qmsf > use auxiliary/gather/impersonate_ssl msf auxiliary(gather/impersonate_ssl) > set RHOST www.symantec.comRHOST => www.symantec.commsf auxiliary(gather/impersonate_ssl) > run[*] www.symantec.com:443 - Connecting to ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.