Upgrading Netcat shells to Meterpreter sessions

Oct. 8, 2017 1 comment Hacking Tutorials Pen Testing & Audits

In the Hacking with Netcat part 2 tutorial we have learned how to work with reverse shells and bind shells in Netcat. As we’ve learned from this tutorial these shells are cmd or Bash shells bound to Netcat using the -e option or reverse shells setup with Bash, Python, PHP or any other (scripting) language. The reverse shell gives us control over the target host in the context of the user who initiated the shell. This is great stuff but what if you want to run local Metasploit privilege escalation exploits on the target? Or Metasploit post exploitation modules and maybe use Meterpreter’s port forwarding functionality? In this case we would need to switch from Netcat to Metasploit and upgrade the shell to a Meterpreter session.

http://www.hackingtutorials.org/networking/upgrading-netcat-shells-to-meterpreter/

Avatar
ariadnalunguco 4 months ago

This perspective makes you think twice when choosing to work with Netcat or Metasploit. Interesting point of view.

Reply