• We just launched and are currently in beta. Join us as we build and grow the community.

One-Lin3r : Fastest Way to Create Reverse Shell & Privesc Commands

GetNoDown

IoT Deployment Strategist
G Rep
0
0
0
Rep
0
G Vouches
0
0
0
Vouches
0
Posts
165
Likes
45
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Purple-Minimalist-Production-Brand-Guideline-Presentation.png


Hey Folks, The tool we’re going to talk about today that can save time from wasting. Usually during the hacking, penetration testing and especially privilege escalation we have to need some different shells called “one-liners” to compromise the machine which takes longer but it provide us (CLI) interface which helps to create multiple shell on one click.

Lets take a look 🙂 !!

Installation

Installation of this tool is quite simple, first we have to meet some requirements of this tool by installing pip tool on our system.

apt install python3-pip1apt install python3-pip

1-19.png


Now we will download “one-lin3r” tool using the given command.

pip3 install one-lin3r1pip3 install one-lin3r

2-23.png


If you face some error while running this tool then you can use the following command.

pip3 install prompt-toolkit --force-reinstall1pip3 install prompt-toolkit--force-reinstall

3-18.png


After doing this, our tool is ready to run. Just execute the given command.

one-lin3r1one-lin3r

4-18.png

List

This provides us several one-liners that we can view using the list command..

5-18.png

Search

With the help of search command we can find one-liners as per the need.

6-17.png

Variables

This command is used to check the target IP address and port number that we enter to create one-liners.

7-13.png

Create one-liner

Now the time has come to create a one-liner and for this mission we have to set our local host IP address to the target option and port can select as per choice but in our case we will choose 4444.

8-11.png


After setting all this, we can create by simply giving the name of the shell.

9-9.png


We can get access of any linux machine using the above shell. For an example we will paste it on another kali linux machine.

10-9.png


As you can see we have got complete control of the other Kali Linux system only by executing the generated shell.

11-10.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin .
 

431,696

312,474

312,483

Top