Skip to content

Reverse shell

ron190 edited this page Mar 11, 2025 · 6 revisions

The RCE security breach represents the next attack vector after SQL injection, however RCE also provides access to the 3rd layer of security concern: the reverse shell.

Rev shell is a direct connection between you and the target, it allows to execute system commands similarly to RCE but with closer affinity, like SSH but with neither encryption nor authentication.

Built-in socket

jSQL provides a built-in java socket that makes the rev shell really easy to setup compared to what you do usually with external tools like netcat.

The minimal setup of rev shell is just a matter of one click, likewise what you do with RCE already with a single click.

Connection setup

Client listens, target connects

That mode requires first to listen on your side on a specific port, then to run a command on the target which connects back directly to your address on that port.

Target listens, client connects

Here it's the opposite, first the RCE runs a command on the target that listens on a specific port, then you connect back to the target.

It's less likely to succeed as the route from your address right back to the target is more likely affected by security measures like firewalls.

Connection method

Default setup is the standard bash but you can select multiple other types like perl and python, as the target can propose several ways to open a connection depending on the packages installed.

You can also experiment with new connection methods, add the new CLI commands to the panel Preferences and use it right away.


Previous topic: Exploit, Next topic: Window