Why is the first step for an attacker to get Reverse Shell after getting RCE?

If someone is having a Remote Code Execution, that means, one can run the commands on the server, then why does he need to get the Reverse Shell?
Even though I can run system commands, then why do I go for Reverse Shell?
I am finding the p… Continue reading Why is the first step for an attacker to get Reverse Shell after getting RCE?

How do I stabilize a reverse shell in when the attack box is using powershell?

I’ve managed to get a version of netcat onto my Windows machine and I can run the standard:
nc -lvnp 1234

and this properly connects to the victim’s machine, but it’s a very fragile connection. Ctrl + C will just drop the connection, tab … Continue reading How do I stabilize a reverse shell in when the attack box is using powershell?