mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-06 12:51:33 -08:00
1.3 KiB
1.3 KiB
TIPS
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
- Make sure the target has internet access (internet access opened)
- Try changing the port to a larger one such as 8080, 8888, etc.
- Encode your script using base64 and then decode it
- Encode your script using url encode
- Check the compiler
Php spawning cmd
https://pastebin.com/bFqVuGwv
Php spawning bash
https://pastebin.com/QsSKm2F1
Enum about the jail
echo $SHELL
echo $PATH
env
export
pwd
*Windows Powershell Pro Tips
- If you was gett the shell, change to powershell, you can run
powershell -ep bypass
Source