Sponsored
Exploiting Tools

PwnLnX – An Advanced Multi-Threaded Python Reverse Shell

Hey Folks, in this tutorial we are going to talk about a powerful reverse shell framework for exploiting linux operating system called “PwnLnX“. PwnLnX is an advanced multi-threaded, multi-client python reverse shell for hacking linux operating systems. As we know that reverse shell is always used to obtain an interactive shell session on the target machine and continue their attack and and it also works in the same way as other reverse shells.

Let’s Pwn the Target Machine 🙂 !!

Requirements

As usual we will install some dependencies that are necessary to operate this tool perfectly. Let’s execute the command below so that all dependencies can be set together.

sudo apt-get install libasound-dev portaudio19-dev libportaudio2 libportaudiocpp0
sudo pip install pyaudio

PwnLnX Tool Installation

Let’s start the process of installing and configuring this tool on kali linux. Just the first thing we need to do is download the github project through the “git clone” command, go to the directory, give executable permission and run the executable file.

git clone https://github.com/spectertraww/PwnLnX.git
cd PwnLnX/
chmod +x setup.sh
./setup.sh

Done 🙂 !! After the installation is completed, we get two executable files one of which will be used to create the payload and the other will be used to get the interactive shell of the target machine.

Activate Listener

Now first we have to activate the listener which will capture the interactive shell of the target machine. Please enter your IP address and port number accordingly.

Usage 🙂 !! python3 PwnLnX.py -lh < Your IP > -lp < Your Port >

python3 PwnLnX.py -lh 192.168.1.7 -lp 4444

Create Payload

Now we will create the payload to exploit linux operating. Payload is very easy to create because it gives us a guided interface.

bash PwnGen.sh

Nice 🙂 !! Once the payload is generated it will be saved in the current directory which we need to execute by transferring it to the victim machine. In our case we are only demonstrating the use of this tool due to which we are executing this payload on the same machine.

PWN 🙂 !! Once we return to the listener side and execute the “show session” command, we see that we have found the interactive shell session of the target machine.

Start Infiltration with Session

After getting a session, we have to infiltrate through the session ID and after that we can execute any command directly on the remote machine. If you get stuck somewhere, you can use the help command.

Core Commands

This means that we can now remotely execute all commands that we are physically able to execute on the linux operating system. As you can see we are able to see the information of the target system.

In the same way we can do whatever we want to do.

Working with Files

We can capture screenshots of the target machine and monitor its movements.

Miscellaneous

We can start capturing the input on the keyboard to be entered by the victim. Once we stop the attack then we can quickly read all captured inputs using the “dump” command.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.