Shells (Linux, Windows, MSFVenom)

HackTricksHackTricks

HackTricks

About the author

Getting Started in Hacking

Pentesting Methodology

External Recon Methodology

Phishing Methodology

Exfiltration

Tunneling and Port Forwarding

Brute Force - CheatSheet

Search Exploits

Shells

Shells (Linux, Windows, MSFVenom)

MSFVenom - CheatSheet

Shells - Windows

Shells - Linux

Full TTYs

Linux/Unix

Checklist - Linux Privilege Escalation

Linux Privilege Escalation

Useful Linux Commands

Linux Environment Variables

MacOS

MacOS Security & Privilege Escalation

Windows

Checklist - Local Windows Privilege Escalation

Windows Local Privilege Escalation

Active Directory Methodology

NTLM

Stealing Credentials

Authentication, Credentials, UAC and EFS

Basic CMD for Pentesters

Basic PowerShell for Pentesters

AV Bypass

Mobile Apps Pentesting

Android APK Checklist

Android Applications Pentesting

iOS Pentesting Checklist

iOS Pentesting

Pentesting

Pentesting Network

Pentesting JDWP - Java Debug Wire Protocol

Pentesting Printers

Pentesting SAP

Pentesting Kubernetes

7/tcp/udp - Pentesting Echo

21 - Pentesting FTP

22 - Pentesting SSH/SFTP

23 - Pentesting Telnet

25,465,587 - Pentesting SMTP/s

43 - Pentesting WHOIS

53 - Pentesting DNS

69/UDP TFTP/Bittorrent-tracker

79 - Pentesting Finger

80,443 - Pentesting Web Methodology

88tcp/udp - Pentesting Kerberos

110,995 - Pentesting POP

111/TCP/UDP - Pentesting Portmapper

113 - Pentesting Ident

123/udp - Pentesting NTP

135, 593 - Pentesting MSRPC

137,138,139 - Pentesting NetBios

139,445 - Pentesting SMB

143,993 - Pentesting IMAP

161,162,10161,10162/udp - Pentesting SNMP

194,6667,6660-7000 - Pentesting IRC

264 - Pentesting Check Point FireWall-1

389, 636, 3268, 3269 - Pentesting LDAP

500/udp - Pentesting IPsec/IKE VPN

502 - Pentesting Modbus

512 - Pentesting Rexec

513 - Pentesting Rlogin

514 - Pentesting Rsh

515 - Pentesting Line Printer Daemon (LPD)

548 - Pentesting Apple Filing Protocol (AFP)

554,8554 - Pentesting RTSP

623/UDP/TCP - IPMI

631 - Internet Printing Protocol(IPP)

873 - Pentesting Rsync

1026 - Pentesting Rusersd

1080 - Pentesting Socks

1098/1099/1050 - Pentesting Java RMI - RMI-IIOP

1433 - Pentesting MSSQL - Microsoft SQL Server

1521,1522-1529 - Pentesting Oracle TNS Listener

1723 - Pentesting PPTP

1883 - Pentesting MQTT (Mosquitto)

2049 - Pentesting NFS Service

2301,2381 - Pentesting Compaq/HP Insight Manager

2375, 2376 Pentesting Docker

3128 - Pentesting Squid

3260 - Pentesting ISCSI

3299 - Pentesting SAPRouter

3306 - Pentesting Mysql

3389 - Pentesting RDP

3632 - Pentesting distcc

3690 - Pentesting Subversion (svn server)

4369 - Pentesting Erlang Port Mapper Daemon (epmd)

5000 - Pentesting Docker Registry

5353/UDP Multicast DNS (mDNS)

5432,5433 - Pentesting Postgresql

5601 - Pentesting Kibana

5671,5672 - Pentesting AMQP

5800,5801,5900,5901 - Pentesting VNC

5984,6984 - Pentesting CouchDB

5985,5986 - Pentesting WinRM

6000 - Pentesting X11

6379 - Pentesting Redis

8009 - Pentesting Apache JServ Protocol (AJP)

8089 - Splunkd

9000 - Pentesting FastCGI

9001 - Pentesting HSQLDB

9042/9160 - Pentesting Cassandra

9100 - Pentesting Raw Printing (JetDirect, AppSocket, PDL-datastream)

9200 - Pentesting Elasticsearch

10000 - Pentesting Network Data Management Protocol (ndmp)

11211 - Pentesting Memcache

15672 - Pentesting RabbitMQ Management

27017,27018 - Pentesting MongoDB

44818/UDP/TCP - Pentesting EthernetIP

47808/udp - Pentesting BACNet

50030,50060,50070,50075,50090 - Pentesting Hadoop

Pentesting Web

Web Vulnerabilities Methodology

Reflecting Techniques - PoCs and Polygloths CheatSheet

2FA/OTP Bypass

Abusing hop-by-hop headers

Bypass Payment Process

Captcha Bypass

Cache Poisoning and Cache Deception

Clickjacking

Client Side Template Injection (CSTI)

Command Injection

Content Security Policy (CSP) Bypass

Cookies Hacking

CORS - Misconfigurations & Bypass

CRLF (%0D%0A) Injection

Cross-site WebSocket hijacking (CSWSH)

CSRF (Cross Site Request Forgery)

Dangling Markup - HTML scriptless injection

Deserialization

Domain/Subdomain takeover

Email Header Injection

File Inclusion/Path traversal

File Upload

Formula Injection

HTTP Request Smuggling / HTTP Desync Attack

H2C Smuggling

IDOR

JWT Vulnerabilities (Json Web Tokens)

NoSQL injection

LDAP Injection

Login Bypass

OAuth to Account takeover

Open Redirect

Parameter Pollution

PostMessage Vulnerabilities

Race Condition

Rate Limit Bypass

Registration Vulnerabilities

Regular expression Denial of Service - ReDoS

Reset/Forgotten Password Bypass

SAML Attacks

Server Side Inclusion/Edge Side Inclusion Injection

SQL Injection

SSRF (Server Side Request Forgery)

SSTI (Server Side Template Injection)

Reverse Tab Nabbing

Unicode Normalization vulnerability

Web Tool - WFuzz

XPATH injection

XSLT Server Side Injection (Extensible Stylesheet Languaje Transformations)

XXE - XEE - XML External Entity

XSS (Cross Site Scripting)

XSSI (Cross-Site Script Inclusion)

XS-Search

Forensics

Basic Forensic Methodology

A.I. Exploiting

BRA.I.NSMASHER Presentation

Blockchain

Blockchain & Crypto Currencies

Courses and Certifications Reviews

INE Courses and eLearnSecurity Certifications Reviews

Cloud Security

Cloud security review

AWS Security

Physical attacks

Physical Attacks

Escaping from KIOSKs

Reversing

Reversing Tools & Basic Methods

Common API used in Malware

Cryptographic/Compression Algorithms

Word Macros

Exploiting

Linux Exploiting (Basic) (SPA)

Exploiting Tools

Windows Exploiting (Basic Guide - OSCP lvl)

Cryptography

Certificates

Cipher Block Chaining CBC-MAC

Crypto CTFs Tricks

Electronic Code Book (ECB)

Hash Length Extension Attack

Padding Oracle

RC4 - Encrypt&Decrypt

BACKDOORS

Merlin

Empire

Salseo

ICMPsh

Stego

Stego Tricks

Esoteric languages

MISC

Basic Python

Other Big References

TODO

More Tools

MISC

Pentesting DNS

Burp Suite

Other Web Tricks

Interesting HTTP

Emails Vulnerabilities

Android Forensics

TR-069

6881/udp - Pentesting BitTorrent

CTF Write-ups

1911 - Pentesting fox

Online Platforms with API

Stealing Sensitive Information Disclosure from a Web

Post ExploitationPowered by GitBook

Shells (Linux, Windows, MSFVenom)

​Shells - Linux​

​Shells - Windows​

​MSFVenom - CheatSheet​

​Full TTYs​

Auto-generated shells

PreviousSearch ExploitsNextMSFVenom - CheatSheet

Last updated 2 months agoEdit on GitHub

ContentsShells - LinuxShells - WindowsMSFVenom - CheatSheetFull TTYsAuto-generated shells

Last updated

Was this helpful?