Vulnerability Development mailing list archives

Windows reverse Shell


From: NetNinja <netninja () hotmail kg>
Date: Tue, 4 Feb 2003 01:37:45 +0600

Hello guys,

David Litchfield in his Blackhat talk, talked about using socket handle
from WSASocket() and pass that handle as a parameter to stdin, stdout
and stderr for CreateProcess function. By doin this way his reverse
cmd shellcode becomes much smaller. I tried coding that reverse
command shell in C, but couldnt get it to work. It simply connects to
my listening netcat listener and then disconnects. David Litchfield
used 4 functions to achieva that WSASocket, bind, connect and
CreateProcess. A lil help would b appreciated on building this reverse
cmd shell. thanx.
  

-- 
Best regards,
 Adik                         mailto:netninja () hotmail kg


Current thread: