项目作者: prodseanb

项目描述 :
Remote code execution. Establish remote shell session.
高级语言: Python
项目地址: git://github.com/prodseanb/reverseshell-rce.git
创建时间: 2021-05-20T03:47:18Z
项目社区:https://github.com/prodseanb/reverseshell-rce

开源协议:

下载


Reverse Shell

References

server.py

Execute this file first. Must be on the attacker host. Acts as a listener. Obtains remote access while connected to client.py.

client.py

Executes a shell on the target host. Need to be executed to open the connection. Will not work without the server.py running.

Setup Environment

  • Both files are safe to install and run (given that you’re using it only for testing purposes), Windows Defender does not classify these files as a threat.
  • You can also push both files to an isolated network and test it there.

To test on two different hosts, (attacker vs. target) find this line in both files and change the server address 0.0.0.0 to your attacker’s IP address.

  1. host = sys.argv[1] if len(sys.argv) > 1 else '0.0.0.0' #server IP

Find this line in client.py and comment it out:

  1. print(f'[*] Receive: {cmd}')
  1. #print(f'[*] Receive: {cmd}')

Do this only if you don’t want the client to receive the output of the commands being used by the server.

Convert both scripts to .exe to run it on Windows.

Objective

The objective of this program is to execute a reverse shell attack on vulnerable machines by establishing
a remote interactive shell. The incremental changes I will be adding to this repo will focus more on
writing scripts to automate payloads, as well as add minor changes/fix bugs.