Reverse Shell Lockheed Martin Khalil Research
Reverse Shell Lockheed Martin Khalil Research
Lockheed Martin
DONE BY: KHALIL B JEBSI
Background Information
● The RFP:
-Lockheed Martin (LM) Space, the Sponsor, provides large scale and
complex systems to the US Government. It delivers various files and
executables to remote systems for their customers.
● Tools Used:
- AES which is The Advanced Encryption Standard which was
announced by the National Institute of Standards and Technology
(NIST) in November 2001.
Project Overview
- -Lockheed Martin (LM) Space, the Sponsor, provides large scale and
complex systems to the US Government. It delivers various files and
executables to remote systems for their customers.
In the first step of the encryption, which is substituting bites, The key and the input data
(also known as the state) are both organized in a 4x4 byte matrix. The input data and 256-bit
key are divided among the byte matrices.
Shiftrows Operation
In the second step, which is the shifting rows action. It handles distinct rows, as suggested
by its name. A straightforward rotation is carried out with a varied rotate width. The fourth
row of the matrix is moved three bytes to the left, the third row is shifted two bytes to the
left,” and the second row of the 4x4 byte input data (the state) is shifted to one-byte position
to the left”, however, the top row remains unchanged.
Mixcloumns Operation
This operation handles columns in the 4x4 state matrix as opposed to the Shiftrows action,
which manipulates rows. It operates on each column individually. Each byte of a column is
mapped into a new value that is a function of all four bytes in that column
Addroundkey Operation
The fourth operation is Add Round, where it
proceeds one column at a time. This operation adds a
round key word with each state column matrix.
Design Alternatives
Encryption plan
First, we are going to generate a new salt, after that, we are going to use scrypt library to
convert the salt and password into a key we can use.
Next, we are going to open a new file and write out the salt, moreover, we are going to
create a new AES encryption using the key.
Then eventually write the encrypted data to a file.
Decryption plan
First, we are going to read the salt from the source file and will get the salt out of the
encrypted file. Then, we are going to convert the salt and password into a key again. After
that, we are going to read the AES GCM generated “nonce” and get out of the encrypted
file. After that we are going to Read the encrypted file bit-by-bit and decrypt it, then output
each part to the output file.
Conclusion
● The encrypted TCP connection made between the Controller and the Shell with AES
256 GCM can be confirmed by compiling both codes and seeing if they understand
each other or by looking inside the network packet through Wireshark.
References
Federal Information. (2001, November 26). Specification for the ADVANCED
ENCRYPTION STANDARD (AES). NIST Computer Security Resource Center |
CSRC. https://csrc.nist.gov/csrc/media/publications/fips/197/final/documents/fips-
197.pdf