Class Activity 8.2 - Reverse Shells
Bash Reverse Shell on Linux





Traffic Analysis of bash reverse shell
Deliverable 1. Run wireshark, create a capture filter on 4449/tcp, and capture a command or two entered through the nc session.


Deliverable 2. Try this out on Pippen by leveraging an uploaded webshell or reverse shell on pippen to run a similar command to connect back to a listener. You may need to upload a small shell script to make this happen, particularly if you are using the simple-backdoor.php script. Provide a screenshot similar to the one below that shows you invoking the reverse shell on the target via curl or your web browser and catching the connection on your kali box.



Windows Powershell Reverse Shell
The following powershell code is run via cmd.exe.
Change ATTACKERIP and ATTACKERPORT to the eth0 IP on kali and port you assigned to a nc listener.

Microsoft Defender to the Rescue

Turn off AV Protection

Deliverable 3. Access your windows VM. Provide a screenshot similar to the one below that shows the unsuccessful execution of powershell via cmd.exe followed by the successful reverse shell after you figure out how to turn off Windows Defender.

Deliverable 4. Hit the internet, see if you can create a python2,3 or php reverse shell on any of the linux targets. Show the command running and the full text of the command used and the results of the id command invoked on the rocky through the reverse shell.




Last updated
