


Pentest Monkey has a great cheatsheet outlining a few different methods, but my favorite technique is to use Metasploit’s msfvenom to generate the one-liner commands for me. The problem is not every server has netcat installed, and not every version of netcat has the -e option. Phineas Fisher Hacks Catalan Police Union Websiteįor reference, in all the screenshots and commands to follow, I am injecting commands in to a vulnerable web server (“VICTIM”) and catching shells from my Kali VM (“KALI”):Įveryone is pretty familiar with the traditional way of using netcat to get a reverse shell:.Pentest Monkey - Post Exploitation Without a TTY.Along with Pentest Monkey, I also learned the techniques from Phineas Fisher in his released videos and writeups of his illegal activities: I’ve come across some good resources that include very helpful tips and techniques for “upgrading” these shells, and wanted to compile and share in a post. Long story short, while these shells are great to catch, I’d much rather operate in a fully interactive TTY. Can’t properly use text editors like vim.

Some commands, like su and ssh require a proper terminal to run.Method 3: Upgrading from netcat with magicĮvery pentester knows that amazing feeling when they catch a reverse shell with netcat and see that oh-so-satisfying verbose netcat message followed by output from id.Īnd if other pentesters are like me, they also know that dreadful feeling when their shell is lost because they run a bad command that hangs and accidentally hit “Ctrl-C” thinking it will stop it but it instead kills the entire connection.īesides not correctly handling SIGINT, these"dumb” shells have other shortcomings as well:.
