Reverse Shell Cheat Sheet Logo

Reverse Shell Cheat Sheet

0
Free
Visit Website

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want an interactive shell. If it's not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either throwing back a reverse shell or binding a shell to a TCP port. This page deals with the former. Your options for creating a reverse shell are limited by the scripting languages installed on the target system – though you could probably upload a binary program too if you're suitably well prepared. The examples shown are tailored to Unix-like systems. Some of the examples below should also work on Windows if you use substitute "/bin/sh -i" with "cmd.exe". Each of the methods below is aimed to be a one-liner that you can copy/paste. As such they're quite short lines, but not very readable.

FEATURES

ALTERNATIVES

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.

Modern, asynchronous, multiplayer & multiserver C2/post-exploitation framework with Python 3 and .NETs DLR.

Darkarmour is a Windows AV evasion tool that helps bypass antivirus software, allowing for the creation of undetectable malware.

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

SharpShares efficiently enumerates and maps network shares and resolves names within a domain.

Check if a domain is in the Alexa or Cisco top one million domain list.

PINNED