#Evasion on #HIDS #NIDS #PostEXP #PHP_Payload (Linux) #IPFS #NGROK #AntiForensic #SSL_Tunneling #PHP_Hard_Coded (XOR & Octal)

This demo demonstrates how to get access to Linux operating systems that can be successfully hidden from various techniques using the #Detection and #Threat_Hunter mechanisms, it may seem simple, but interesting to know.

Using multiple encodings such as XOR, Octal and BASE64, or the #IPFS service we had previously broken into, we were able to share our own overview on the Internet, meaning that services such as PasteBin and others can access information. It does not recognize the writer’s entities, and can be transferred to the victim’s operating system as a P2P file, the other being the use of customized encoding on a UIID processor that will run Base64