Sometime during 2015, hackers realized it was possible to steal/hijack someone's meterpreter session by simply playing around with the victim's DNS and launching their own handler to connect. This led to the development and release of meterpreter paranoid mode. The developers introduced an API that verified the SHA1 hash of the certificate presented by the msf at both ends. In this recipe, we will see how to use the paranoid mode.
Using the paranoid meterpreter
How to do it...
Let's perform the following steps:
- We need an SSL certificate. We can generate our own by using the following commands:
openssl req -new -newkey rsa:4096 -days 365 -nodes -x509 -keyout meterpreter.key -out meterpreter.crt
The output...