Reverse Shell Cheat Sheet

Reverse shell attack

A reverse shell is a shell session established on a connection that is initiated from a remote machine a reverse shell is a type of shell in which the target machine communicates back to the attacking machine. # Reverse Shell Cheat Sheet

The attacking machine has a listener port on which it receives the connection, which by using, code or command execution is achieved.

  1. windows 10 uac bypass
  2. System Hacking Kali Linux
  3. MsfVenom Payload Cheat Sheet
  4. Hack Gmail Password Phishing 2021
  5. Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet

ip-address = Attacker ip address

port = Attacker port

Linux Bash Reverse Shell

PHP Reverse Shell

Python Reverse Shell

Socat Reverse Shell

Attacker Payload Listener

Client Side

Perl Reverse Shell

Perl Windows Reverse Shell

Ruby Reverse Shell

Netcat Reverse Shell

Ncat Reverse Shell

Java Reverse Shell

Power-Shell Reverse Shell

xTerm Reverse Shell

AWK Reverse Shell

What is reverse shell command ?

The reverse shell command is a Linux shell command, that helps the attacker to make a session on a target machine, reverse shell connection is initiated from a remote machine, not from the local machine. Attackers who successfully make a reverse connection with the target machine using the shell command attacker can control the target system.

What port does reverse shell use ?

In this case, the attacker can use any port for listening reverse shell connections. but common attackers use a port, 80,443 or 4444 for reverse shell listening.

What is a PHP reverse shell ?

A reverse shell is a kind of “virtual” shell that is initiated from a victim’s computer to connect with the attacker’s computer. The attacker can execute any command on the target system on the same privilege as the current Web Application used to run a website that initiated the connection.

What is reverse TCP?

The Reverse TCP attacks are a new approach to exploit the target system connection. using the reverse TCP shell connection attacker can control the remote computer using own system.

What is netcat Reverse shell ?

A netcat reverse shell is a shell executed from the target host back to the attacker’s computer which is in a listening state to pick up the reverse connection shell. A bind shell is set up on the target host and binds to a targeted port to listen for an incoming connection from the attack machine.