Interactive reverse connection shell based on HTTP short connection。
- stdin(0), stdout(1), stderr(2) are not connected outward
- No pipeline for stdin(0), stdout(1), stderr(2)
- Pretending to be a python crawler
- Interactive shell, which can execute interactive commands such as ssh/ftp
- Automatic reconnection
- CTRL + C to force the current command to exit (non interactive command)
- Modify IP and port in client.py and port in server.py
- client.py is based on python2.x and is used for controlled machine
- server.py is based on python3.x and is used for your own machine
- Enter
iabefore the command to run interactive commands, such asia ssh [email protected] - Enter
exiton the server side and press enter to exit. At this time, the client enters the sleep state and sends a request to the server every 60s. The connection can be restored when the server is online - When you run a non interactive command, when you use
Ctrl + C, the program asks if you want to end the current command. EnterCto end the current command,pto end the program,qto cancel the operation
It is only used for the research of Intranet penetration defense technology. It is used for defense of such attacks. It is forbidden to use it for attack behavior, or the consequences will be borne by yourself.