Reverse Shell
Last updated
Last updated
We start by Listening in our host first ~$ nc -nvlp PORT_NUMBER
; then we execute the below command on the attacked server:
Check this by swissky.
Create a new wordpress plugin using the simple php file below
In order to upload the shell as a plugin, we need to zip it first then upload it as a plugin via wp-admin
after activating it, use netcat to listen on port 443 and catch the shell
Resources: