netshell 1.0.0__tar.gz → 1.0.1__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {netshell-1.0.0/src/netshell.egg-info → netshell-1.0.1}/PKG-INFO +45 -3
- netshell-1.0.1/README.md +61 -0
- {netshell-1.0.0 → netshell-1.0.1}/pyproject.toml +1 -1
- {netshell-1.0.0 → netshell-1.0.1/src/netshell.egg-info}/PKG-INFO +45 -3
- netshell-1.0.0/README.md +0 -19
- {netshell-1.0.0 → netshell-1.0.1}/LICENSE +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/setup.cfg +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/src/netshell/__init__.py +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/src/netshell/main.py +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/src/netshell.egg-info/SOURCES.txt +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/src/netshell.egg-info/dependency_links.txt +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/src/netshell.egg-info/entry_points.txt +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/src/netshell.egg-info/requires.txt +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/src/netshell.egg-info/top_level.txt +0 -0
- {netshell-1.0.0 → netshell-1.0.1}/test/testserver.py +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: netshell
|
|
3
|
-
Version: 1.0.
|
|
3
|
+
Version: 1.0.1
|
|
4
4
|
Summary: A CLI HTTP shell to connect to remote shells
|
|
5
5
|
Author: Richard A. Dubniczky
|
|
6
6
|
License: MIT License
|
|
@@ -31,11 +31,25 @@ License-File: LICENSE
|
|
|
31
31
|
Requires-Dist: requests>=2.33.1
|
|
32
32
|
Dynamic: license-file
|
|
33
33
|
|
|
34
|
-
#
|
|
34
|
+
# Netshell
|
|
35
35
|
|
|
36
36
|
A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
|
|
37
37
|
|
|
38
|
-
##
|
|
38
|
+
## Installation
|
|
39
|
+
|
|
40
|
+
Install using pip:
|
|
41
|
+
|
|
42
|
+
```sh
|
|
43
|
+
pip install netshell
|
|
44
|
+
```
|
|
45
|
+
|
|
46
|
+
or manually by downloading the git repository:
|
|
47
|
+
|
|
48
|
+
```sh
|
|
49
|
+
git clone https://github.com/dubniczky/Netshell
|
|
50
|
+
```
|
|
51
|
+
|
|
52
|
+
## Usage
|
|
39
53
|
|
|
40
54
|
The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
|
|
41
55
|
|
|
@@ -50,3 +64,31 @@ www-data
|
|
|
50
64
|
```
|
|
51
65
|
|
|
52
66
|
Use `httpshell --help` for all flags and options.
|
|
67
|
+
|
|
68
|
+
Command line options:
|
|
69
|
+
- `-h`, `--help` - show this help message and exit
|
|
70
|
+
- `--address`, `-a` _ADDRESS_ Target address containing the full path. E.g., http://example.com/vulnerable.php
|
|
71
|
+
- `--parameter`, `-p` _PARAMETER_ Parameter name where the injection will occur. E.g., 'cmd' for http://example.com/vulnerable.php?cmd=...
|
|
72
|
+
- -`-cookies`, `-c` _COOKIES_ Use cookies for the request
|
|
73
|
+
- -`-agent` _AGENT_ Set a custom User-Agent header for the requests
|
|
74
|
+
- `--prefix`, `-P` _PREFIX_ Set a custom prefix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
|
|
75
|
+
- `--suffix`, `-S` _SUFFIX_ Set a custom suffix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
|
|
76
|
+
- `--verbose`, `-v` Verbose output
|
|
77
|
+
- `--no-url-encode` Disable URL encoding of commands
|
|
78
|
+
- `--no-preflight` Skip preflight checks and go straight to the shell interface
|
|
79
|
+
|
|
80
|
+
## Testing
|
|
81
|
+
|
|
82
|
+
The `/test` folder contains a simple injectable web server that can be started using Docker Compose.
|
|
83
|
+
|
|
84
|
+
```sh
|
|
85
|
+
cd test
|
|
86
|
+
docker compose up
|
|
87
|
+
```
|
|
88
|
+
|
|
89
|
+
The injectable point is at `/good` path with the `p` query parameter. By contrast the `/bad` path is not injectable.
|
|
90
|
+
|
|
91
|
+
Then starting the shell
|
|
92
|
+
```sh
|
|
93
|
+
netshell -a http://localhost:8000/good -p q
|
|
94
|
+
```
|
netshell-1.0.1/README.md
ADDED
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
# Netshell
|
|
2
|
+
|
|
3
|
+
A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
|
|
4
|
+
|
|
5
|
+
## Installation
|
|
6
|
+
|
|
7
|
+
Install using pip:
|
|
8
|
+
|
|
9
|
+
```sh
|
|
10
|
+
pip install netshell
|
|
11
|
+
```
|
|
12
|
+
|
|
13
|
+
or manually by downloading the git repository:
|
|
14
|
+
|
|
15
|
+
```sh
|
|
16
|
+
git clone https://github.com/dubniczky/Netshell
|
|
17
|
+
```
|
|
18
|
+
|
|
19
|
+
## Usage
|
|
20
|
+
|
|
21
|
+
The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
|
|
22
|
+
|
|
23
|
+
```sh
|
|
24
|
+
httpshell -a http://example.com/vln.php -p q
|
|
25
|
+
```
|
|
26
|
+
```txt
|
|
27
|
+
Connection successful!
|
|
28
|
+
|
|
29
|
+
example.com > whoami
|
|
30
|
+
www-data
|
|
31
|
+
```
|
|
32
|
+
|
|
33
|
+
Use `httpshell --help` for all flags and options.
|
|
34
|
+
|
|
35
|
+
Command line options:
|
|
36
|
+
- `-h`, `--help` - show this help message and exit
|
|
37
|
+
- `--address`, `-a` _ADDRESS_ Target address containing the full path. E.g., http://example.com/vulnerable.php
|
|
38
|
+
- `--parameter`, `-p` _PARAMETER_ Parameter name where the injection will occur. E.g., 'cmd' for http://example.com/vulnerable.php?cmd=...
|
|
39
|
+
- -`-cookies`, `-c` _COOKIES_ Use cookies for the request
|
|
40
|
+
- -`-agent` _AGENT_ Set a custom User-Agent header for the requests
|
|
41
|
+
- `--prefix`, `-P` _PREFIX_ Set a custom prefix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
|
|
42
|
+
- `--suffix`, `-S` _SUFFIX_ Set a custom suffix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
|
|
43
|
+
- `--verbose`, `-v` Verbose output
|
|
44
|
+
- `--no-url-encode` Disable URL encoding of commands
|
|
45
|
+
- `--no-preflight` Skip preflight checks and go straight to the shell interface
|
|
46
|
+
|
|
47
|
+
## Testing
|
|
48
|
+
|
|
49
|
+
The `/test` folder contains a simple injectable web server that can be started using Docker Compose.
|
|
50
|
+
|
|
51
|
+
```sh
|
|
52
|
+
cd test
|
|
53
|
+
docker compose up
|
|
54
|
+
```
|
|
55
|
+
|
|
56
|
+
The injectable point is at `/good` path with the `p` query parameter. By contrast the `/bad` path is not injectable.
|
|
57
|
+
|
|
58
|
+
Then starting the shell
|
|
59
|
+
```sh
|
|
60
|
+
netshell -a http://localhost:8000/good -p q
|
|
61
|
+
```
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: netshell
|
|
3
|
-
Version: 1.0.
|
|
3
|
+
Version: 1.0.1
|
|
4
4
|
Summary: A CLI HTTP shell to connect to remote shells
|
|
5
5
|
Author: Richard A. Dubniczky
|
|
6
6
|
License: MIT License
|
|
@@ -31,11 +31,25 @@ License-File: LICENSE
|
|
|
31
31
|
Requires-Dist: requests>=2.33.1
|
|
32
32
|
Dynamic: license-file
|
|
33
33
|
|
|
34
|
-
#
|
|
34
|
+
# Netshell
|
|
35
35
|
|
|
36
36
|
A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
|
|
37
37
|
|
|
38
|
-
##
|
|
38
|
+
## Installation
|
|
39
|
+
|
|
40
|
+
Install using pip:
|
|
41
|
+
|
|
42
|
+
```sh
|
|
43
|
+
pip install netshell
|
|
44
|
+
```
|
|
45
|
+
|
|
46
|
+
or manually by downloading the git repository:
|
|
47
|
+
|
|
48
|
+
```sh
|
|
49
|
+
git clone https://github.com/dubniczky/Netshell
|
|
50
|
+
```
|
|
51
|
+
|
|
52
|
+
## Usage
|
|
39
53
|
|
|
40
54
|
The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
|
|
41
55
|
|
|
@@ -50,3 +64,31 @@ www-data
|
|
|
50
64
|
```
|
|
51
65
|
|
|
52
66
|
Use `httpshell --help` for all flags and options.
|
|
67
|
+
|
|
68
|
+
Command line options:
|
|
69
|
+
- `-h`, `--help` - show this help message and exit
|
|
70
|
+
- `--address`, `-a` _ADDRESS_ Target address containing the full path. E.g., http://example.com/vulnerable.php
|
|
71
|
+
- `--parameter`, `-p` _PARAMETER_ Parameter name where the injection will occur. E.g., 'cmd' for http://example.com/vulnerable.php?cmd=...
|
|
72
|
+
- -`-cookies`, `-c` _COOKIES_ Use cookies for the request
|
|
73
|
+
- -`-agent` _AGENT_ Set a custom User-Agent header for the requests
|
|
74
|
+
- `--prefix`, `-P` _PREFIX_ Set a custom prefix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
|
|
75
|
+
- `--suffix`, `-S` _SUFFIX_ Set a custom suffix for the commands. This is usually the command escape. By default there is none. No modifications apply to this, so make sure to encode it properly if needed.
|
|
76
|
+
- `--verbose`, `-v` Verbose output
|
|
77
|
+
- `--no-url-encode` Disable URL encoding of commands
|
|
78
|
+
- `--no-preflight` Skip preflight checks and go straight to the shell interface
|
|
79
|
+
|
|
80
|
+
## Testing
|
|
81
|
+
|
|
82
|
+
The `/test` folder contains a simple injectable web server that can be started using Docker Compose.
|
|
83
|
+
|
|
84
|
+
```sh
|
|
85
|
+
cd test
|
|
86
|
+
docker compose up
|
|
87
|
+
```
|
|
88
|
+
|
|
89
|
+
The injectable point is at `/good` path with the `p` query parameter. By contrast the `/bad` path is not injectable.
|
|
90
|
+
|
|
91
|
+
Then starting the shell
|
|
92
|
+
```sh
|
|
93
|
+
netshell -a http://localhost:8000/good -p q
|
|
94
|
+
```
|
netshell-1.0.0/README.md
DELETED
|
@@ -1,19 +0,0 @@
|
|
|
1
|
-
# HTTP Shell
|
|
2
|
-
|
|
3
|
-
A lightweight HTTP CLI Shell that enables custom command injection into vulnerable web applications with a familiar shell-like interface.
|
|
4
|
-
|
|
5
|
-
## Examples
|
|
6
|
-
|
|
7
|
-
The `q` query parameter of `http://example.com/vln.php` is vulnerable to command injections, then the following command connects to it and starts a shell-like environment:
|
|
8
|
-
|
|
9
|
-
```sh
|
|
10
|
-
httpshell -a http://example.com/vln.php -p q
|
|
11
|
-
```
|
|
12
|
-
```txt
|
|
13
|
-
Connection successful!
|
|
14
|
-
|
|
15
|
-
example.com > whoami
|
|
16
|
-
www-data
|
|
17
|
-
```
|
|
18
|
-
|
|
19
|
-
Use `httpshell --help` for all flags and options.
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|