Spawn TTY
Bash
Python
Perl
Socat
On the attacker machine, set up socat listener: replace 4444 with your listening port.
On the victim machine, connect back the attacker machine and spawn a shell. Replace <host>
with attacker IP and <port>
with attacker listing port.
Misc
Interactive TTY
Backgrounding the remote shell with CTRL-Z:
Getting ROWS and COLS within current terminal window:
Ignoring hotkeys in the local shell and getting back to the remote:
Setting correct size for the remote shell (where
ROWS
andCOLS
are the values from the 3rd bullet):
Adding some colors:
Reloading bash to apply the TERM variable:
Last updated