Reverse Shell Cheat Sheet Logo

Reverse Shell Cheat Sheet

0
Free
Visit Website

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want an interactive shell. If it's not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either throwing back a reverse shell or binding a shell to a TCP port. This page deals with the former. Your options for creating a reverse shell are limited by the scripting languages installed on the target system – though you could probably upload a binary program too if you're suitably well prepared. The examples shown are tailored to Unix-like systems. Some of the examples below should also work on Windows if you use substitute "/bin/sh -i" with "cmd.exe". Each of the methods below is aimed to be a one-liner that you can copy/paste. As such they're quite short lines, but not very readable.

FEATURES

ALTERNATIVES

Metta is an information security preparedness tool for adversarial simulation.

A lightweight and portable Docker container for penetration testers and CTF players

A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

Check if a domain is in the Alexa or Cisco top one million domain list.

A wargaming network for penetration testers to practice their skills in a realistic environment.

Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.

Hidden parameters discovery suite

A tool for Local File Inclusion (LFI) exploitation and scanning

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved