User Tools

Site Tools


interactive_reverse_http_s_sessions

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
interactive_reverse_http_s_sessions [2019/07/25 12:49] – external edit 127.0.0.1interactive_reverse_http_s_sessions [2021/03/15 17:58] (current) – [Security Concerns] lucy
Line 19: Line 19:
  
  
-The Tool only runs in the memory (called “file” in Process View). After the termination, the session cannot be established again. You can click on the IP and start executing commands in the Windows shell. The output should appear after a few seconds automatically. Also, this Tool only works with Windows 7/8 in combination with IE and Firefox.+The Tool only runs in the memory (called “file” in Process View). After the termination, the session cannot be established again. You can click on the IP and start executing commands in the Windows shell. The output should appear after a few seconds automatically. Also, this Tool only works with Windows 7/8/10 in combination with Internet Explorer, Firefox, Microsoft Edge and Chrome.
  
 ===== Configuration ===== ===== Configuration =====
Line 50: Line 50:
  
  
-The tool allows you to use a limited set of commands. Some commands in Windows are not executable, they are built into the command line (Example of command with executable: whoami).  If we need to use a command which is a built-in command line, then we should call cmd directly (example for requesting the directory content: "cmd /c dir"). Here are a few more examples of how to run shell commands:+The tool allows you to use a limited set of commands. Some commands in Windows are not executable, they are built into the command line (Example of command with executable: whoami).  If we need to use a command which is a built-in command line, then we should call it directly. Here are a few more examples of how to run shell commands:
  
-  * cmd /c dir +  *  dir 
-  * cmd /c cd C:\ & dir +  *  cd C:\ & dir 
-  * cmd /c type C:\autoexec.bat +  *  type C:\autoexec.bat 
-  * cmd /c dir "C:\Program Files\+  *  dir "C:\Program Files\
 \\ \\
  
interactive_reverse_http_s_sessions.1564051799.txt.gz · Last modified: 2019/07/25 12:49 by 127.0.0.1