Netcat, is actually our favorite reverse_shell attack, Why? because it’s fun.
What does reverse_shell means? A reverse_shell is a communication by some port, and reverse the communication back to the hacker.
Like ICMP requesting.
[LETS MAKE IT WORK]
First of all, we need to download Netcat for windows from here: https://eternallybored.org/misc/netcat/
#1) Extract the NC zip, and inject the netcat-1.11 folder into the target’s PC, under root directory. There are lots of ways to do this – you can dig here: http://linuxphilosophy.com/rtfm/armitage/
#2) On the Target’s desktop, create a new TXT file, Right click on the TXT file > edit & type: nc -lvp 50000. Save & Close the file, and change the File name to nc.cmd format.
*The 50000 means the port number*
#3) Hit double click on the nc.cmd file & you will get this
#4) go to your Linux machine, open a terminal & type:
assault@kalivm:~$ sudo netcat 192.168.50.7 50000
*The 50000 is the port number*
*Now you can chit-chat from Linux Terminal to Windows Command Prompt & from Windows Command Prompt to Linux Terminal *
*Example A = Linux Terminal to Command Prompt*
*Example B = Command Prompt to Linux Terminal*
Here is an example by Gamer Forever