netshell 1.0.0__tar.gz → 1.0.1__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: netshell
3
- Version: 1.0.0
3
+ Version: 1.0.1
4
4
  Summary: A CLI HTTP shell to connect to remote shells
5
5
  Author: Richard A. Dubniczky
6
6
  License: MIT License
@@ -31,11 +31,25 @@ License-File: LICENSE
31
31
  Requires-Dist: requests>=2.33.1
32
32
  Dynamic: license-file
33
33
 
34
- # HTTP Shell
34
+ # Netshell
35
35
 
36
36
  A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
37
37
 
38
- ## Examples
38
+ ## Installation
39
+
40
+ Install using pip:
41
+
42
+ ```sh
43
+ pip install netshell
44
+ ```
45
+
46
+ or manually by downloading the git repository:
47
+
48
+ ```sh
49
+ git clone https://github.com/dubniczky/Netshell
50
+ ```
51
+
52
+ ## Usage
39
53
 
40
54
  The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
41
55
 
@@ -50,3 +64,31 @@ www-data
50
64
  ```
51
65
 
52
66
  Use `httpshell --help` for all flags and options.
67
+
68
+ Command line options:
69
+ - `-h`, `--help` - show this help message and exit
70
+ - `--address`, `-a` _ADDRESS_ Target address containing the full path. E.g., http://example.com/vulnerable.php
71
+ - `--parameter`, `-p` _PARAMETER_ Parameter name where the injection will occur. E.g., 'cmd' for http://example.com/vulnerable.php?cmd=...
72
+ - -`-cookies`, `-c` _COOKIES_ Use cookies for the request
73
+ - -`-agent` _AGENT_ Set a custom User-Agent header for the requests
74
+ - `--prefix`, `-P` _PREFIX_ Set a custom prefix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
75
+ - `--suffix`, `-S` _SUFFIX_ Set a custom suffix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
76
+ - `--verbose`, `-v` Verbose output
77
+ - `--no-url-encode` Disable URL encoding of commands
78
+ - `--no-preflight` Skip preflight checks and go straight to the shell interface
79
+
80
+ ## Testing
81
+
82
+ The `/test` folder contains a simple injectable web server that can be started using Docker Compose.
83
+
84
+ ```sh
85
+ cd test
86
+ docker compose up
87
+ ```
88
+
89
+ The injectable point is at `/good` path with the `p` query parameter. By contrast the `/bad` path is not injectable.
90
+
91
+ Then starting the shell
92
+ ```sh
93
+ netshell -a http://localhost:8000/good -p q
94
+ ```
@@ -0,0 +1,61 @@
1
+ # Netshell
2
+
3
+ A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
4
+
5
+ ## Installation
6
+
7
+ Install using pip:
8
+
9
+ ```sh
10
+ pip install netshell
11
+ ```
12
+
13
+ or manually by downloading the git repository:
14
+
15
+ ```sh
16
+ git clone https://github.com/dubniczky/Netshell
17
+ ```
18
+
19
+ ## Usage
20
+
21
+ The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
22
+
23
+ ```sh
24
+ httpshell -a http://example.com/vln.php -p q
25
+ ```
26
+ ```txt
27
+ Connection successful!
28
+
29
+ example.com > whoami
30
+ www-data
31
+ ```
32
+
33
+ Use `httpshell --help` for all flags and options.
34
+
35
+ Command line options:
36
+ - `-h`, `--help` - show this help message and exit
37
+ - `--address`, `-a` _ADDRESS_ Target address containing the full path. E.g., http://example.com/vulnerable.php
38
+ - `--parameter`, `-p` _PARAMETER_ Parameter name where the injection will occur. E.g., 'cmd' for http://example.com/vulnerable.php?cmd=...
39
+ - -`-cookies`, `-c` _COOKIES_ Use cookies for the request
40
+ - -`-agent` _AGENT_ Set a custom User-Agent header for the requests
41
+ - `--prefix`, `-P` _PREFIX_ Set a custom prefix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
42
+ - `--suffix`, `-S` _SUFFIX_ Set a custom suffix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
43
+ - `--verbose`, `-v` Verbose output
44
+ - `--no-url-encode` Disable URL encoding of commands
45
+ - `--no-preflight` Skip preflight checks and go straight to the shell interface
46
+
47
+ ## Testing
48
+
49
+ The `/test` folder contains a simple injectable web server that can be started using Docker Compose.
50
+
51
+ ```sh
52
+ cd test
53
+ docker compose up
54
+ ```
55
+
56
+ The injectable point is at `/good` path with the `p` query parameter. By contrast the `/bad` path is not injectable.
57
+
58
+ Then starting the shell
59
+ ```sh
60
+ netshell -a http://localhost:8000/good -p q
61
+ ```
@@ -4,7 +4,7 @@ build-backend = "setuptools.build_meta"
4
4
 
5
5
  [project]
6
6
  name = "netshell"
7
- version = "1.0.0"
7
+ version = "1.0.1"
8
8
  description = "A CLI HTTP shell to connect to remote shells"
9
9
  readme = "README.md"
10
10
  authors = [{ name = "Richard A. Dubniczky" }]
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: netshell
3
- Version: 1.0.0
3
+ Version: 1.0.1
4
4
  Summary: A CLI HTTP shell to connect to remote shells
5
5
  Author: Richard A. Dubniczky
6
6
  License: MIT License
@@ -31,11 +31,25 @@ License-File: LICENSE
31
31
  Requires-Dist: requests>=2.33.1
32
32
  Dynamic: license-file
33
33
 
34
- # HTTP Shell
34
+ # Netshell
35
35
 
36
36
  A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
37
37
 
38
- ## Examples
38
+ ## Installation
39
+
40
+ Install using pip:
41
+
42
+ ```sh
43
+ pip install netshell
44
+ ```
45
+
46
+ or manually by downloading the git repository:
47
+
48
+ ```sh
49
+ git clone https://github.com/dubniczky/Netshell
50
+ ```
51
+
52
+ ## Usage
39
53
 
40
54
  The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
41
55
 
@@ -50,3 +64,31 @@ www-data
50
64
  ```
51
65
 
52
66
  Use `httpshell --help` for all flags and options.
67
+
68
+ Command line options:
69
+ - `-h`, `--help` - show this help message and exit
70
+ - `--address`, `-a` _ADDRESS_ Target address containing the full path. E.g., http://example.com/vulnerable.php
71
+ - `--parameter`, `-p` _PARAMETER_ Parameter name where the injection will occur. E.g., 'cmd' for http://example.com/vulnerable.php?cmd=...
72
+ - -`-cookies`, `-c` _COOKIES_ Use cookies for the request
73
+ - -`-agent` _AGENT_ Set a custom User-Agent header for the requests
74
+ - `--prefix`, `-P` _PREFIX_ Set a custom prefix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
75
+ - `--suffix`, `-S` _SUFFIX_ Set a custom suffix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
76
+ - `--verbose`, `-v` Verbose output
77
+ - `--no-url-encode` Disable URL encoding of commands
78
+ - `--no-preflight` Skip preflight checks and go straight to the shell interface
79
+
80
+ ## Testing
81
+
82
+ The `/test` folder contains a simple injectable web server that can be started using Docker Compose.
83
+
84
+ ```sh
85
+ cd test
86
+ docker compose up
87
+ ```
88
+
89
+ The injectable point is at `/good` path with the `p` query parameter. By contrast the `/bad` path is not injectable.
90
+
91
+ Then starting the shell
92
+ ```sh
93
+ netshell -a http://localhost:8000/good -p q
94
+ ```
netshell-1.0.0/README.md DELETED
@@ -1,19 +0,0 @@
1
- # HTTP Shell
2
-
3
- A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
4
-
5
- ## Examples
6
-
7
- The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
8
-
9
- ```sh
10
- httpshell -a http://example.com/vln.php -p q
11
- ```
12
- ```txt
13
- Connection successful!
14
-
15
- example.com > whoami
16
- www-data
17
- ```
18
-
19
- Use `httpshell --help` for all flags and options.
File without changes
File without changes
File without changes
File without changes