Crates.io | comandare |
lib.rs | comandare |
version | 0.3.0 |
source | src |
created_at | 2020-12-02 23:53:27.372137 |
updated_at | 2020-12-08 18:03:56.304343 |
description | TCP Command Execution |
homepage | https://crates.io/crates/comandare |
repository | https://github.com/gregl83/comandare |
max_upload_size | |
id | 319086 |
size | 19,370 |
TCP Command Execution
Network ports enable computers to interact around the world but unintentional open ports wreak havoc on system security.
Demonstrate how a program can open a port enabling remote access; otherwise, known as a backdoor.
Reinforce security intuition with network port management.
cargo install --path=.
comandare
should now be installed on your systemRun comandare
to see command execution format.
Supported modes:
much more...
Comandare uses a server target model which is largely mitigated by any standard firewall. Incoming traffic in most configurations is rightfully blocked. Thus, binding a TCP Server to a specific port might work in a local network but be blocked from remote access over the internet or more networks backed by one or more firewalls. A more effective approach, since TCP is a two-way communication protocol, is to initiate a client target model with event-driven connection attempts.
This package is not intended on being deployed or used in an environment other than for educational testing; thus, sacrifices have been made to simply assemble a proof of concept. NOT to be used maliciously.
The TCP Server does not implement any form of Auth leaving your network security as the sole guardian of your data.
Opening TCP Ports on a system can be bad, use at your own risk!
Hopefully this package can increase intuition on backdoor implementations indirectly helping secure systems.