Sponsored
Exploiting Tools

PwnLnX – An Advanced Multi-Threaded Python Reverse Shell

Hey Folks, in this tutorial we are going to talk about a powerful reverse shell framework for exploiting linux operating system called “PwnLnX“. PwnLnX is an advanced multi-threaded, multi-client python reverse shell for hacking linux operating systems. As we know that reverse shell is always used to obtain an interactive shell session on the target machine and continue their attack and and it also works in the same way as other reverse shells.

Let’s Pwn the Target Machine 🙂 !!

Requirements

As usual we will install some dependencies that are necessary to operate this tool perfectly. Let’s execute the command below so that all dependencies can be set together.

sudo apt-get install libasound-dev portaudio19-dev libportaudio2 libportaudiocpp0
sudo pip install pyaudio

PwnLnX Tool Installation

Let’s start the process of installing and configuring this tool on kali linux. Just the first thing we need to do is download the github project through the “git clone” command, go to the directory, give executable permission and run the executable file.

git clone https://github.com/spectertraww/PwnLnX.git
cd PwnLnX/
chmod +x setup.sh
./setup.sh

Done 🙂 !! After the installation is completed, we get two executable files one of which will be used to create the payload and the other will be used to get the interactive shell of the target machine.

Activate Listener

Now first we have to activate the listener which will capture the interactive shell of the target machine. Please enter your IP address and port number accordingly.

Usage 🙂 !! python3 PwnLnX.py -lh < Your IP > -lp < Your Port >

python3 PwnLnX.py -lh 192.168.1.7 -lp 4444

Create Payload

Now we will create the payload to exploit linux operating. Payload is very easy to create because it gives us a guided interface.

bash PwnGen.sh

Nice 🙂 !! Once the payload is generated it will be saved in the current directory which we need to execute by transferring it to the victim machine. In our case we are only demonstrating the use of this tool due to which we are executing this payload on the same machine.

PWN 🙂 !! Once we return to the listener side and execute the “show session” command, we see that we have found the interactive shell session of the target machine.

Start Infiltration with Session

After getting a session, we have to infiltrate through the session ID and after that we can execute any command directly on the remote machine. If you get stuck somewhere, you can use the help command.

Core Commands

This means that we can now remotely execute all commands that we are physically able to execute on the linux operating system. As you can see we are able to see the information of the target system.

In the same way we can do whatever we want to do.

Working with Files

We can capture screenshots of the target machine and monitor its movements.

Miscellaneous

We can start capturing the input on the keyboard to be entered by the victim. Once we stop the attack then we can quickly read all captured inputs using the “dump” command.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored
Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

4 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

9 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

9 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.