Reverse Shell Cheat Sheet

If you’re lucky enough to find a command execution¬†vulnerability¬†during a penetration test, pretty soon afterwards you’ll probably want an interactive shell. If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a reverse shell or binding … Continue reading Reverse Shell Cheat Sheet