Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CVE-2026-7118 | THREATINT

    April 27, 2026

    Introducing a New Command-and-Control Feature in go-exploit: The ShellTunnel | Blog

    April 27, 2026

    ZDI-26-181: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 27, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Introducing a New Command-and-Control Feature in go-exploit: The ShellTunnel | Blog
    News

    Introducing a New Command-and-Control Feature in go-exploit: The ShellTunnel | Blog

    adminBy adminApril 27, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • go-exploit, VulnCheck’s open-source exploit framework, now includes a new C2 feature called ShellTunnel.
    • ShellTunnel captures reverse shell traffic and routes it through an intermediary attacker-controlled server before reaching the main command-and-control (C2) server.
    • This setup ensures that the victim device never directly connects to the C2, which can be beneficial in bypassing network egress restrictions.
    • ShellTunnel is fully compatible with older exploits and requires minimal modification to implement.

    go-exploit is a Go-based exploit framework built and maintained by VulnCheck’s Initial Access Intelligence team. The design uniquely supports a range of flexible C2 configurations. The latest feature to hit go-exploit is ShellTunnel, a new C2 that adds flexibility and operational security by capturing and forwarding reverse shell traffic from an intermediary server before sending it on to the primary C2 server.

    ShellTunnel C2

    What makes ShellTunnel especially appealing is its simplicity and ease of integration. The C2 effectively acts as a proxy shell, allowing teams to redirect traffic through a middle server instead of a direct connection. This is valuable for a variety of operational reasons, including network egress rules that can limit direct connections to external servers.

    The ShellTunnel setup is straightforward yet powerful. Here’s how it operates:

    1. Exploitation: The attacker initiates an attack from an intermediary system using go-exploit. A good example would be an attacker that has compromised a firewall, and is attempting to pivot inwards. The intermediary is the firewall.
    2. Reverse Shell Capture: The compromised system sends the reverse shell back to the attacker’s server (intermediary server or firewall in the above example), where go-exploit is running.
    3. Data Forwarding to C2: go-exploit’s ShellTunnel then forwards this reverse shell traffic to the main C2 server, creating a separation between the compromised device and the C2.

    This separation means that the target device only connects to the attacker’s intermediary server, never to the main C2, which may help avoid detection and reduce certain types of network logging.

    To showcase ShellTunnel, we used an example based on our previously open sourced go-exploit for CVE-2023-22527, affecting Confluence servers (see our previous writeup, Does Confluence Dream of Shells?). We updated the exploit to incorporate the new ShellTunnel feature. This required only a minor version bump and specifying ShellTunnel in the C2 list within the go-exploit configuration.

    ShellTunnel Example

    To better illustrate, we deployed ShellTunnel in a lab environment using three key components:

    • Victim Machine: A Windows machine running Confluence, serving as the target of exploitation.
    • Attacker Server: This intermediary server captures the reverse shell before forwarding it to the C2.
    • Command and Control Server (C2): The final destination for the reverse shell traffic, providing centralized control over the compromised device.

    Using this setup, we initiated the attack from the attacker server. After capturing the reverse shell, we forwarded it to the C2 using SSL encryption, enabling us to monitor the traffic with Wireshark for verification. This setup allowed us to observe the traffic flow between each component, with unencrypted traffic between the victim and attacker, and SSL-encrypted traffic from the attacker to the C2.

    ShellTunnel’s separation of attacker and C2 connections offers several advantages for exploitation efforts:

    • Network Evasion: Network rules designed to prevent direct outbound connections may be bypassed, as the victim only needs to connect to the attacker server.
    • Enhanced Operational Security: Because the target device does not connect directly to the C2, it reduces exposure to network scans and detection tools that monitor external connections.
    • Ease of Implementation: ShellTunnel’s configuration in go-exploit requires minimal changes, making it compatible with existing exploits without extensive modification.

    The ShellTunnel update is part of go-exploit’s open-source package, available on GitHub. Once set up, adding ShellTunnel to an exploit requires only a few tweaks to the C2 list within go-exploit, making it accessible for various operational scenarios with minimal setup.

    We welcome contributions to go-exploit from the community, so if this feature inspires you to build out new C2 methods or you’d like to see specific functionalities in future releases, feel free to submit a pull request.

    ShellTunnel brings a new level of flexibility to go-exploit’s C2 capabilities, adding valuable proxying functionality with easy configuration. By separating the attacker from the C2, it provides an added layer of evasion and operational security, making it a promising addition for scenarios where avoiding direct C2 connections is critical.

    The VulnCheck Initial Access team is always looking to advance the state of attack on initial access vulnerabilities. For more research and updates like this, see our blogs, Exploring ABB Vulnerabilities, PaperCut Exploitation and Fileless Remote Code Execution on Juniper Firewalls
    . Sign up to start a trial of our Initial Access Intelligence and Exploit & Vulnerability Intelligence product today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleZDI-26-181: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability
    Next Article CVE-2026-7118 | THREATINT
    admin
    • Website

    Related Posts

    News

    Could your choice of metrics be harming your SOC?

    April 27, 2026
    News

    Detecting Exploitation w/ VulnCheck Initial Access Intelligence – October 2024 | Blog

    April 27, 2026
    News

    Outpacing NIST NVD with VulnCheck NVD++ | Blog

    April 26, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202664 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202664 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    CVE-2026-7118 | THREATINT

    April 27, 2026

    Introducing a New Command-and-Control Feature in go-exploit: The ShellTunnel | Blog

    April 27, 2026

    ZDI-26-181: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 27, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.