Vulnerability Development mailing list archives
Windows reverse Shell
From: NetNinja <netninja () hotmail kg>
Date: Tue, 4 Feb 2003 01:37:45 +0600
Hello guys, David Litchfield in his Blackhat talk, talked about using socket handle from WSASocket() and pass that handle as a parameter to stdin, stdout and stderr for CreateProcess function. By doin this way his reverse cmd shellcode becomes much smaller. I tried coding that reverse command shell in C, but couldnt get it to work. It simply connects to my listening netcat listener and then disconnects. David Litchfield used 4 functions to achieva that WSASocket, bind, connect and CreateProcess. A lil help would b appreciated on building this reverse cmd shell. thanx. -- Best regards, Adik mailto:netninja () hotmail kg
Current thread:
- Windows reverse Shell NetNinja (Feb 03)
- Re: Windows reverse Shell 3APA3A (Feb 05)
- Re[2]: Windows reverse Shell Adik (Feb 05)
- Re[2]: Windows reverse Shell 3APA3A (Feb 05)
- Re: Windows reverse Shell sk (Feb 05)
- <Possible follow-ups>
- Re: Windows reverse Shell Ali Saifullah Khan (Feb 05)
- Re: Windows reverse Shell Berend-Jan Wever (Feb 05)
- Re: Windows reverse Shell 3APA3A (Feb 05)