Pentesting 101: Shells
- by Vince
-
in Blog
-
Hits: 2692
Up until now, we've discussed using Nmap to scan for open ports, web fuzzers that enumerate directories and files, hash cracking, and we've even taken it a little further toward the victim with brute force attacks where we were able to login to a web application. But even with the successful login to a web application, I feel like we're sort of just pecking around the perimeter. Shells take us to that next level where we're able to pierce the skin and get below the surface.
This can be a tricky subject to wrap ones mind around so rather than jumping into the idea of shells immediately, let's start off with leveraging a tool, Netcat, for two way communication.
To better help (I hope!) keep this straight, I've colored each side.