Files
OSINT-Cheat-sheet/Script/Red-Team/Php-scripts/Revershe-shell.md
2025-03-29 19:38:34 +07:00

1.3 KiB

TIPS

If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below

  1. Make sure the target has internet access (internet access opened)
  2. Try changing the port to a larger one such as 8080, 8888, etc.
  3. Encode your script using base64 and then decode it
  4. Encode your script using url encode
  5. Check the compiler

Php spawning cmd

https://pastebin.com/bFqVuGwv

Php spawning bash

https://pastebin.com/QsSKm2F1

Enum about the jail

echo $SHELL
echo $PATH
env
export
pwd

*Windows Powershell Pro Tips

  • If you was gett the shell, change to powershell, you can run
powershell -ep bypass 

Source