Netcat

Netcat, is actually our favorite reverse_shell attack, Why? because it’s fun.
What does reverse_shell means? A reverse_shell is a communication by some port, and reverse the communication back to the hacker.
Like ICMP requesting.

[LETS MAKE IT WORK]
First of all, we need to download Netcat for windows from here: https://eternallybored.org/misc/netcat/

#1) Extract the NC zip, and inject the netcat-1.11 folder into the target’s PC, under root directory. There are lots of ways to do this – you can dig herehttp://linuxphilosophy.com/rtfm/armitage/

Like this

Pic-1

 

#2) On the Target’s desktop, create a new TXT file, Right click on the TXT file > edit & type: nc -lvp 50000. Save & Close the file, and change the File name to nc.cmd format.
*The 50000 means the port number*

Like this
*Example A*

Pic-2

*Example B*

Pic-3

*Example C*

Pic-4

 

#3)  Hit double click on the nc.cmd file & you will get this

Pic-5

 

#4) go to your Linux machine, open a terminal & type:
assault@kalivm:~$ sudo netcat 192.168.50.7 50000
*The 50000 is the port number*

*Now you can chit-chat from Linux Terminal to Windows Command Prompt & from Windows Command Prompt to Linux Terminal  *

 

*Example A = Linux Terminal to Command Prompt*

Linux_to_Win_Linux_Side

Linux_to_Win_Win_Side

 

*Example B = Command Prompt to Linux Terminal*

Win_To_Linux_Win_Side

Win_To_Linux_Linux_Side

 

ENJOY! 🙂

 

Here is an example by Gamer Forever