Skip to content

Performs a wordlist attack using known Linux commands on a bind TCP shell

Notifications You must be signed in to change notification settings

tikene/TCP-Shell-wordlist-attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

TCP Remote shell wordlist attack (Direct bind)

This tool will automatically try a list of commands on a TCP direct shell and display the results

Useful to find out what commands are available during post exploitation

fe36c8d9e21edad138a8e4b231d6ab56 (1)

Arguments:

usage: tcp-shell-wordlist.py [-h] [-ip TCP_IP] [-port TCP_PORT]
                             [-w WORDLIST_FILE] [-errstr NOTFOUND_MSG]
                             [-delay DELAY]

optional arguments:
  -h, --help            show this help message and exit
  -ip TCP_IP            *Target ip
  -port TCP_PORT        *Target port
  -w WORDLIST_FILE      List of commands to try
  -errstr NOTFOUND_MSG  Console uknown command string
  -delay DELAY          Delay after sending command

Installation:

To install simply do "pip install -r requirements.txt"

Credits:

Default wordlist taken from https://github.com/yzf750/custom-fuzzing/blob/master/linux-commands-merged.txt

About

Performs a wordlist attack using known Linux commands on a bind TCP shell

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages