GTFOBins.github.io/_data/functions.yml

56 lines
2.2 KiB
YAML
Raw Normal View History

2018-05-25 15:30:02 +02:00
execute-interactive:
label: Interactive execute
2018-05-25 18:46:40 +02:00
description: It executes interactive commands that may be used to break out from restricted shells.
2018-05-21 21:14:41 +02:00
2018-05-25 15:30:02 +02:00
execute-non-interactive:
label: Non-interactive execute
2018-05-25 18:46:40 +02:00
description: It executes non-interactive commands that may be used to break out from restricted shells.
2018-05-21 21:14:41 +02:00
suid-enabled:
label: SUID
2018-05-27 19:28:35 +02:00
description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. If it is used to run `/bin/sh -p`, omit the `-p` on systems like Debian that allow to run a SUID shell by default.
2018-05-21 21:14:41 +02:00
suid-limited:
label: Limited SUID
2018-05-25 18:46:40 +02:00
description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. This only works on systems like Debian that allow to run a SUID shell by default.
2018-05-21 21:14:41 +02:00
sudo-enabled:
label: Sudo
2018-05-22 22:31:37 +02:00
description: It runs in privileged context and may be used to escalate or maintain privileges if enabled on `sudo`.
2018-05-21 21:14:41 +02:00
download:
label: Download
description: It can download remote files.
upload:
label: Upload
description: It can exfiltrate files on the network.
2018-05-25 15:30:02 +02:00
bind-shell-interactive:
label: Interactive bind shell
2018-05-21 21:14:41 +02:00
description: It can bind a shell to a local port to allow remote network access.
2018-05-25 15:30:02 +02:00
reverse-shell-interactive:
label: Interactive reverse shell
2018-05-21 21:14:41 +02:00
description: It can send back a reverse shell to a listening attacker to open a remote network access.
bind-shell-non-interactive:
label: Non-interactive bind shell
description: It can bind a non-interactive shell to a local port to allow remote network access.
reverse-shell-non-interactive:
label: Non-interactive reverse shell
description: It can send back a non-interactive reverse shell to a listening attacker to open a remote network access.
2018-05-25 15:30:02 +02:00
load-library:
label: Library load
description: It loads shared libraries that may be used to run code in the binary execution context.
2018-05-28 19:08:53 +02:00
file-read:
label: File read
description: It reads files and may be used to do privileged reads or disclose files outside a restricted environment.
2018-05-28 19:55:44 +02:00
2018-05-28 19:08:53 +02:00
file-write:
label: File write
description: It writes files and may be used to do privileged writes or write files outside a restricted environment.