top of page

Custom Reverse Shell Backdoor for WIN/LIN/MAC


Python in penetration testing and you may use or tune the code for a real world case. Plus you will be aware of the effectiveness of client-side attack and the importance of programming your own weapon where other tools will fail in such a tough scenario.

Example of how this works:

Attacker Machine >IP address : 10.0.2.15/24 >OS: BackTrack 5 R3 >Python Version: 2.6

Victim Machine >IP address : 192.168.1.15/24 >OS: Windows 7 SP1 32 bit >Zone Alarm Firewall and anti-virus installed (free version) >Python Version: 2.7 (installed for demonstration only)

Network Infrastructure >Pfsense Firewall with SNORT IDS/IPS integrated service >Pfsense is NATing the victim machine [192.168.1.15] to its WAN interface [10.0.2.1] >2xVirtual switches created by VBox

Building the machines from scratch inside VBox is out of our scope in this article; however, I have to briefly show you the configuration in case someone would like to replicate the scenario.

If you like this video, visit his instagram page @the.red.team. If you want this tool or other tools he has them made, DM him and he will be happy to help.

Recent Posts 
Serach By Tags
No tags yet.
bottom of page