Remote code execution. Establish remote shell session.
Execute this file first. Must be on the attacker host. Acts as a listener. Obtains remote access while connected to client.py
.
Executes a shell on the target host. Need to be executed to open the connection. Will not work without the server.py
running.
To test on two different hosts, (attacker vs. target) find this line in both files and change the server address 0.0.0.0
to your attacker’s IP address.
host = sys.argv[1] if len(sys.argv) > 1 else '0.0.0.0' #server IP
Find this line in client.py
and comment it out:
print(f'[*] Receive: {cmd}')
#print(f'[*] Receive: {cmd}')
Do this only if you don’t want the client to receive the output of the commands being used by the server.
Convert both scripts to .exe
to run it on Windows.
The objective of this program is to execute a reverse shell attack on vulnerable machines by establishing
a remote interactive shell. The incremental changes I will be adding to this repo will focus more on
writing scripts to automate payloads, as well as add minor changes/fix bugs.