Note – ***This video is made for educational purposes only***.
I’m performing all the attacks in a virtual lab controlled by me. Any illegal usage of such educational content will be your own responsibility. Let’s start!
In this video, we will be discussing how to create a reverse shell using any programming language of your choice by utilizing the website https://www.revshells.com/. We will be using a PowerShell one-liner to obtain a reverse shell from Windows 11 to Termux via NetCat. It is important to ensure that the target machine (Windows 11) and the attacker’s machine (Termux on Android) are on the same subnet to facilitate this connection. If they are not on the same subnet, the attacker must bind the backdoor to an IP address and port and forward incoming connections to the ncat running on Termux.
The demonstration in this video will showcase the attack within a LAN (Local Area Network) environment. The first step will be to copy the payload from the website https://www.revshells.com/. The second step is to upload the reverse shell to the Apache2 webserver. The third and final step is to download and execute the payload in Windows PowerShell to obtain a reverse shell.
In real-life scenarios, attackers may purchase a domain that they control and upload the backdoors there. As they have control over their remote web server, they will configure it to forward incoming connections to their specified Termux machine IP. This will allow them to control the victim’s computer from anywhere in the world.