For windows victim machine

Method 1: using rlwrap command

While you can capture a reverse shell using rlwrap on both Windows and Linux machines, I prefer this command for Windows, though I’m not sure why. 😂

Run your payload to get a shell and capture the request using rlwrap and nc.

# Catch the reverse shell using the below command.
sudo rlwrap nc -lnvp $PortNumber

Last updated