GTFObins

GTFObins

GTFObins (Get The F*** Out binaries) are a collection of 200+ legitimate Unix binaries that can be abused by an attacker during the post-exploitation phase : https://gtfobins.github.io/

find

it is possible to escalate our privileges via a root SUID on the find binary, since it posses an -exec flag which can be used to spawn a reverse shell.

find /tmp -exec /bin/sh -p \; will execute a shell (/bin/sh) by injecting it into the -exec option of the find command.

vim

One can use vim to spawn a shell ; this can be used to escape restricted shells or even privesc if *really* misconfigured. First the shell attribute must be defined using :set shell=/bin/bash, and then the shell cmdlet executed via :shell .

awk

awk - The awk utility is commonly used to manipulate text files. However, it can also be used to execute commands by injecting code into a script file.

awk 'BEGIN {system("/bin/sh")}' - will execute a shell (/bin/sh) by injecting it into an awk script.

Last updated

Was this helpful?