RoguePotato
RoguePotato copied to clipboard
Implement reverse tunnel
With this reverse tcp tunnel we can circumvent firewall restrictions on the target machine, but still being able to perform the whole attack from Linux.
Hi @viniciusmarangoni ,
thanks for your PR!
this project was born as a POC of the vulnerability and i would like to keep it as simple as possible to just show the vuln.
The reverse tunnel could be implemented in many ways and it's a logic i don't want embed in the POC of this vuln.
I converted this PR as draft because for sure someone will find it useful to have all the logic bundled together.