InsomniaShell ASP.NET Reverse Shell Or Bind Shell
Download ===== https://blltly.com/2tu8L5
InsomniaShell ASP.NET Reverse Shell Or Bind Shell
InsomniaShell: A Tool for Creating ASP.NET Shells
Have you ever wanted to gain remote access to a web server running ASP.NET If you have the ability to upload or create an arbitrary .aspx page, you can use InsomniaShell, a tool that provides either a reverse shell or a bind shell using native calls through pinvoke.
A reverse shell is a setup where the target machine connects to the attacker's machine and gives the attacker a command prompt. This is useful when the target machine does not have a public IP address or is behind a firewall. A bind shell is a setup where the attacker connects to a service running on the target machine and gets a command prompt. This requires the attacker to know the IP address of the target machine and an open port.
InsomniaShell has some advanced features, such as searching through all accessible processes looking for a SYSTEM or Administrator token to use for impersonation. It also has functionality for a named pipe impersonation attack, which requires knowledge of the sa password and results in stealing the token that the SQL server is executing under.
If you want to learn more about InsomniaShell, you can download it from this link. You can also read more about the difference between bind shell and reverse shell from this article.
How to Use InsomniaShell
To use InsomniaShell, you need to upload or create an arbitrary .aspx page on the target web server. You can use any tool or method that allows you to do that, such as a file upload vulnerability, a web shell, or a remote code execution exploit. Once you have the .aspx page on the server, you need to access it from your browser or a tool like curl.
The .aspx page will present you with a simple interface where you can choose between a reverse shell or a bind shell. You also need to enter the IP address and port of the listener for the reverse shell, or the port to bind to for the bind shell. After clicking on the "Launch" button, you should get a shell prompt on your listener.
If you want to use the advanced features of InsomniaShell, such as impersonation or named pipe attack, you need to click on the "Advanced" button and enter the required parameters. For example, if you want to impersonate a SYSTEM or Administrator token, you need to enter the process ID of a process running under that account. If you want to perform a named pipe attack, you need to enter the sa password of the local SQL Server instance.
Other Tools for Creating ASP.NET Shells
InsomniaShell is not the only tool for creating ASP.NET shells. There are other tools that can help you achieve similar results. Some of them are:
SharPyShell: A tiny and obfuscated ASP.NET webshell that executes commands with SYSTEM privileges.
Nishang: A framework and collection of scripts and payloads which enables usage of PowerShell for offensive security.
IIS-ShortName-Scanner: A tool to brute force short names (8.3) of files and directories in an IIS web server.
IIS-Rewrite-Backdoor: A backdoor using native IIS modules.
You can also use tools like Insomnia or Postman to test and interact with web APIs and services. a474f39169