Category Archives: reverse-shells

Converted PCAP sample of a Microsoft Windows Reverse Shell

Converted PCAP sample of a Microsoft Windows Reverse Shell, the shell is spawned on port 4444, the hacked PC initiates the connection to 192.168.1.109 which has a Netcat listener waiting on port 4444 to spawn a command line shell on connect. You can see once the shell is spawned a user is created and added… Read More »

Share Button

Simple ways to create PHP, Python, PERL, xterm, bash, exec, java and Netcat Reverse Shells

simple-ways-to-create-php-python-perl-xterm-bash-exec-java-netcat-reverse-shells

Share Button