Posts:
5
Threads:
1
Joined:
May 2023
Reputation:
Credits: 6.71€ [Donate] so yea im just way to confused on how tf i find my port for my IP. so if im trying to use a rat in needs like the IP and port number that works with canyouseeme.org and shit but i cannot find any useful info online and shit and idfk where else i should ask with the state of forums nowadays so yea any help is greatly appreciated thx
Posts:
23
Threads:
3
Joined:
May 2023
Reputation:
Credits: 8.3€ [Donate] 06-19-2023, 04:04 PM (This post was last modified: 06-19-2023, 04:07 PM by cyberiagu.) how could you not find useful info online? TCP/IP ports are literally one of the most common things in networking... aight here is how it works:
(I am assuming that you have a connect-back RAT/reverse shell running and cannot make the back-connection)
You want your computer or proxy or whatever to wait for a connection in order to send commands to the RAT. for that, you need to OPEN a port first. There are many many ways to do that, depending on the software you use. here is one of the easiest ways using netcat:
```
nc -l -v -p <port_number>
```
This will open <port_number> on a given machine, the IP address will be the machines IP. Depending on the RAT/reverse shell you are using, this is enough.
If you are ever unsure about topics like this (which are more programming-related than black hat hacking) check out stackoverflow.com or stackexchange.com they have pretty much every known problem solved already.
If you do this, you can verify that the port is open by running
```
netstat -an | grep tcp
```
which will list all open tcp ports on a given machine. or you could run a portscan with nmap on yourself if you wanna get fancy.
If you are still having problems with your RAT, there may be an issue client-side, i.e. the RAT is blocked by a firewall, intrusion detecion system or it just didn't work (are you using metasploit? malfunctioning reverse shells in metasploit are super common)