Damn. You’ve given me a vision of a future where people call applications that are installed locally and don’t leverage any cloud/server backend for any functionality “self-hosted” programs and I hate it.
Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.
Damn. You’ve given me a vision of a future where people call applications that are installed locally and don’t leverage any cloud/server backend for any functionality “self-hosted” programs and I hate it.
It is pretty easy. There’s tons of tutorials and walkthroughs for doing it, but anyone familiar with UIs will be able to work it out pretty quickly I think. Maybe a friction point in using the filter query, but again there’s tons of walkthroughs and guides for using it online.
If you can’t conceptualize a packet, or sockets, or network flows, even with the help of online guides/manuals, I guess it wouldn’t be easy. In that case I’d be wondering why someone would want to use those tools in the first place though, as then they probably wouldn’t have the skills necessary to leverage the information gleaned from the tool in any useful way.
Edit - As we’re in the self-hosted community, I’d argue that anyone who is self-hosting anything would probably be able to easily install wireshark and view http requests, both individual packets and the stream as a whole.
This site has probably the best disclaimer I’ve ever seen at the bottom of the page.
And even more You must understand, that using a boat may be dangerous:
-The boat may fall over.
-You may fall out of the boat.
-The boat may hit a rock.
-Your shoes may get wet.
-The boat may get filled with water.
-The boat may sink.
-Another boat may hit Your boat.
-The boat may drift a long distance away.
-You may get lost with the boat.
-When rowing, You may get blisters in Your hands and butt.
-If You get into water, You may drown or get hypothermia.
-Killer sharks may attack You.
-Anything else may happen
👌
Holy fuck that is unhinged. Side note, who is behind that site, and why do they have so many ads for Alex Jones? Kind of liking how they all link to the infowars domain, which is going to be owned by someone else soon hopefully though.
You’re asking how to set up c2 infrastructure. You’re asking this question on a programming community, not a cybersecurity community, which is an odd decision by itself. You have made it abundantly clear that you are not asking this bc you’re trying to start up some red team ae program at your work, you’re doing this to perform illegal activity.
Nobody is going to help you with this. No security professional is going to help you bc it’s completely unethical, and maintaining appropriate ethics is a huge part of maintaining employability in that sector. No one who does this stuff criminally will help you bc you’ve proven to have zero discretion and helping you will probably lead to the feds taking their front door off its hinges. Also you’re competition.
If you don’t know how to do this already, which you obviously don’t, you put in the work to learn this skill set. Once you’ve done that, doing it professionally is much more stable, and has a much better risk vs reward, than doing it illegally.