#Windows Security #Post-exploitation #Reverse Shell
Reverse Shell
Once an RCE-type vulnerability is detected, we are able to create a reverse shell. On windows, often the only option for various types of exploits is to use a single standalone executable file. Here you have some options for establishing reverse shell connection.
IMPORTANT: When establishing reverse shells, remember to use common ports, e.g. 53, 80, 443. Then there is less chance that the outgoing connection will be blocked by the firewall.
Generators:
Listener on Linux:
Standalone binary
Netcat
Netcat executable for Windows (link):