Establishing a reverse shell without any software tools like Netcat (by the server)

Has it ever happened or is it possible that just by configuring custom code on the attacker’s listener like with Python or any other programming language, if a victim just connects to it using TCP, a reverse shell can happen without the vi… Continue reading Establishing a reverse shell without any software tools like Netcat (by the server)

Running code on attacker machine from a reverse ssh exploit? (Low level theoretical explanation required)

Reverse shell. A victim server runs a malicious binary which creates an SSH connection to the attacker machine. Then the attacker machine SSH’s to the victim server and runs commands (that way you bypass the firewall and closed ports). Tha… Continue reading Running code on attacker machine from a reverse ssh exploit? (Low level theoretical explanation required)

Metasploit won’t establish reverse_https connect, says "Without a database connected that payload UUID tracking will not work!" [closed]

I’m new to msfconsole and want to play around with it. I’ve got a LAN Turtle that is on the same network as my computer with Metasploit. I am using metasploit v6.3.16-dev. The payload is python/meterpreter/reverse_https and I’ve verified t… Continue reading Metasploit won’t establish reverse_https connect, says "Without a database connected that payload UUID tracking will not work!" [closed]