View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006818 | Kali Linux | Kali Package Bug | public | 2020-11-03 06:12 | 2021-09-14 20:20 |
Reporter | iamthevic001 | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | always |
Status | closed | Resolution | suspended | ||
Product Version | 2020.3 | ||||
Summary | 0006818: Reverse shell on netcat does not provide command prompt | ||||
Description | When I exploit an issue and obtain a connect back via a reverse shell, I usually get a command prompt that allows me to move further ahead with the exploit. However, I updated the Kali package on 30-10-2020, and later found that I get the reverse shell upon a successful exploit, but I don't get a command prompt. As a result of this I have to use the meterpreter payload and exploit the service. | ||||
Steps To Reproduce | Steps to reproduce are as follows:
| ||||
Are you specifying any level of verbosity with your netcat listener command? |
|
Yes. I use the nc -nlvp <add listening port> . But the issue is persisting. |
|
Have you tried not using the 'p' flag, since it's already listening locally & it seems kinda redundant? |
|
This report has been filed against an old version of Kali. We will be closing this ticket due to inactivity. |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2020-11-03 06:12 | iamthevic001 | New Issue | |
2020-11-04 02:37 | TommyT | Note Added: 0013625 | |
2020-11-04 05:01 | iamthevic001 | Note Added: 0013627 | |
2020-11-04 07:24 | TommyT | Note Added: 0013628 | |
2020-12-01 10:48 | g0tmi1k | Priority | urgent => normal |
2020-12-01 10:50 | g0tmi1k | Severity | crash => minor |
2021-09-14 20:20 | g0tmi1k | Status | new => closed |
2021-09-14 20:20 | g0tmi1k | Resolution | open => suspended |
2021-09-14 20:20 | g0tmi1k | Note Added: 0015189 |