This post is by a banned member (HugzAngelic) - Unhide
OP 10 December, 2021 - 07:04 PM
(This post was last modified: 10 December, 2021 - 07:08 PM by HugzAngelic. Edited 3 times in total.)
Reply
The following examples assums that the hacker IP is 10.20.14 and use port 8080 for the connection.
Therefore in all of these cases you need to listen for port 8080 using the following command:
nc -l -p 8080
Hidden Content
You must
register or
login to view this content.
This post is by a banned member (dsadsad3131) - Unhide
11 December, 2021 - 12:46 AM
Reply
This post is by a banned member (HugzAngelic) - Unhide
OP 12 December, 2021 - 09:05 PM
Reply
This post is by a banned member (rhonem1990) - Unhide
24 December, 2021 - 04:57 PM
Reply
This post is by a banned member (baddebhenchod_2) - Unhide
This post is by a banned member (RiseScar) - Unhide
01 January, 2022 - 12:59 PM
Reply
This post is by a banned member (crackkl) - Unhide
01 January, 2022 - 07:57 PM
Reply
(10 December, 2021 - 07:04 PM)manueldayr Wrote: Show MoreThe following examples assums that the hacker IP is 10.20.14 and use port 8080 for the connection.
Therefore in all of these cases you need to listen for port 8080 using the following command:
nc -l -p 8080
asdasdasd
This post is by a banned member (mrkoadic) - Unhide
04 January, 2022 - 10:57 AM
Reply