In the previous recipe, we discovered this program acts very much like a reverse shell. We also discovered an IP address within this program that may or may not belong to our organization. Because dynamic analysis may provide us with additional information, and because this binary connects to someone else's host, we'll need to edit some of the bytes in the binary so that it connects to a host we own only. This is actually a lot easier than you may realize and we've already touched on one of the tools that can help us to accomplish this rather easily.
In this recipe, we'll use the hex editor tool to help us to accomplish our mission. We've already installed this tool in previous chapters and actually, we've also seen its output—when we examined a CTF style of binary challenge. This tool is rather simple to use but can be destructive...