Reverse Shell


Reverse Shell (Cheat Sheet)

πŸ” Reverse Shells – Flipping the Flow

🧠 What is a Reverse Shell?

In a reverse shell, the target (victim) initiates the connection back to your attacker (listener) machine.

πŸ“ Attacker = Server πŸ“ Target = Client


πŸ§ͺ Hands-On: Reverse Shell with PowerShell on Windows


πŸ–₯️ Step 1: Start Listener on Attacker

Using port 443 (HTTPS) improves chances of getting through firewalls undetected.


πŸͺŸ Step 2: PowerShell One-Liner on Windows Target

πŸ“Œ Make sure to replace '10.10.14.158' with your attacker IP address.


⚠️ Common Blocker: Antivirus!

πŸ’£ If Windows Defender is enabled, you may see:


πŸ›‘οΈ Disable Defender Realtime Protection (For Lab Use Only!)

➑️ Run in an Admin PowerShell Console


βœ… Step 3: Success! Back on the Attacker…

And on your shell prompt:

πŸŽ‰ Boom β€” you now have remote access to the Windows box!


πŸ“š Bonus: Reverse Shell Cheat Snippets

🐧 Bash (Linux target)


πŸͺŸ PowerShell (Alternate)

Last updated