t0thkr1s / revshellgen

Reverse shell generator written in Python 3.
https://medium.com/infosec-adventures
GNU General Public License v3.0
504 stars 94 forks source link

commands on attacking machine #15

Open Gulshan45 opened 11 months ago

Gulshan45 commented 11 months ago

Now that it starts listening on my system on 0.0.0.0 and my specified ports. Now what command should i run on target machine?

t0thkr1s commented 11 months ago

Hi!

It gives you the finished command as output and the script also copies that to your clipboard. You can use that output on the target machine. Hope it helps!

Gulshan45 commented 11 months ago

should i run that command on target machine?

t0thkr1s commented 11 months ago

Exactly! Because that output will give you the reverse shell back to you from the target machine.

Gulshan45 commented 11 months ago

my attacking system is ubuntu. Which would be the target system? like ubuntu, kali, windows ?

Gulshan45 commented 11 months ago

since it works fine on the same network. How can we test it on different network like source machine on one network(personal hotspot) and target machine on different network(office network).?

t0thkr1s commented 11 months ago

you can run the command on any machine that you would like to connect back to your ubuntu. if you are in separate networks, you will need a public IP (that is accessible like a VPS) so that you can catch the reverse connection.