Chapter 8. Payloads and Shells

In this chapter, we will cover the following topics:

  • Extracting data through HTTP requests
  • Creating an HTTP C2
  • Creating an FTP C2
  • Creating an Twitter C2
  • Creating a simple Netcat shell

Introduction

In this chapter, we will be looking at the creation of reverse shells and payloads in Python. Once an upload vulnerability has been identified on a Linux or Mac system, Python payloads are in the sweet spot of next steps. They are easy to craft or customize to match a specific system, have clear functionality, and best of all, almost all Mac and Linux systems come with Python 2.7 by default.

Get Python Web Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.