Fedora Project

Remote Command Execution using reverse Shell

A reverse shell is a type of shell connection where the victim communicates with the attacker's computer. The attacker has a listening port active which listens from the victim's machine, this is how command execution works. You need to create a victim file and an attacker file in python/shell(Keep the exploit limited to Linux based OS. No need to create for windows or android). The attacker should have a listening port active and it should access the victim's shell.(Don't Cause Damage to someone else's Computer Files.)

Deliverables:

Submit the code in Pagure/GitHub and and Asciinema recording which shows you are controlling the victim.

Contact Mentor:

Please do not copy someone else's work from the internet. If you have doubts contact the Fedora Summer Coding group using telegram. If you are not already a member you can join the group https://t.me/fedoraSummerCoding

Task tags

  • cyber-security

Students who completed this task

skr1p7, Rajvardhan, hack3r_0m, Jess Kwek, nella17, justan00b, synnek, m1m3, Anu2006, srikavin, Vyachko, Abtaha, espagueti, Chenlitw, simon7l7, Shadowblade, paraxor, geek123, KanarekLife, ntrung03, strawberryshaker2005, EmperorAj, ns0631, Mukundan314, Aadarsh Raj, Mirza, hydrophobefireman, Suhas

Task type

  • code Code
close

2019