[ C ] Reverse Shell

Allows a remote shell connection to be made. Pipes data between the spawned shell and the remote connection via winsock.
[ Code – C ]Reverse Shell Server

In the screenshot below you can see that I’ve got the Reverse-shell server running on my Windows 7 machine, internal address 10.0.0.2 on port 2221, which I connect to using a backtrack VM telnet session. On successful connection one is presented with the target machines command prompt:

The most obvious usage of course is during a hack, to take complete control of your victims PC.

Advertisements

~ by Rhys Mossom on August 24, 2012.

One Response to “[ C ] Reverse Shell”

  1. I think this is a bind shell and how to compile this?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: