Gaining access with reverse-shell-over-tor

In order to obtain a reverse shell preserving anonymity, we will use reverse-shell-over-tor from Offensive Tor Toolkit. As shown in the following illustration, the attacker will publish a Hidden Service so that the victim can send the reverse shell to it.

Reverse shell over Tor

1. Hidden Service and handler

The attacker will publish a Hidden Service so that the attacker can start a connection:

In order to handle the connection, the attacker will start a listener with netcat:

2. Victim connects to the Hidden Service

We have to launch a reverse shell from the Victim to the Hidden Service. The tool we need is reverse-shell-over-tor . The only parameter we need is the address and port in which the Hidden Service is listening.

3. The handler receives the shell

Once the victim connects with reverse-shell-over-tor , a /bin/sh shell is launched.

The attacker could change the shell binary by using the parameter -reverse-shell-program.

Last updated

Was this helpful?