Advanced Scriptable Shell

The problem with the back door, which we created in the previous chapter, is that if the attacker IP changes we don't have a built-in mechanism to inform our target that it should connect to the new IP address. In this chapter we will look into a method that lets you keep a fixed reserved name for your attacker machine even if its IP changes.

The following are the topics that will be covered in this chapter: 

  • Dynamic DNS
  • Interacting with Twitter
  • Replicating Metasploit's screen capturing
  • Replicating Metasploit searching for content
  • Integrating a low-level port scanner

Get Python for Offensive PenTest now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.