Shells
Listener
rlwrap -cAr nc -lnvp <Port Number>Web Shells
Locate and upload appropriate shells from - /user/share/webshells
Reverse Shells
Refer to https://www.revshells.com/
Reverse Shells (MSFvenom)
NOTE:
shell/reverse_tcp = staged payload
shell_reverse_tcp = unstaged payload
staged payload requires meterpreter listener
Linux
Windows
SunOS (Solaris)
Web-based Payloads
PHP
ASP[X]
JSP
WAR
NodeJS
Script Language Payloads
Evil-WinRM
NOTE:
Verify usability with: crackmapexec winrm <Target IP>
Look for port 5985 in nmap scans
Powercat.ps1
Perl
Python
PHP
Bash
NOTE: Create a .sh file and paste the following
Netcat
Linux
Windows
PowerShell
Do the following in Kali's pwsh
Create the following python script and run it
TTY Shell
NOTE: Sometime we get a reverse shell and it may not be fully functional. The following commands allow us to spawn proper shell.
Python
Bash
Perl
Ruby
Lua
IRB
Vi
Nmap:
Last updated