Blind OS Command Injection using Serial Number

Blind OS Command Injection using Serial Number
Download Copy
Title: Blind OS Command Injection using Serial Number
Author: TW-D

This payload allows a remote attacker to execute commands on a Linux system using the serial number as a vector to pass the commands to be executed

There are many forms of remote access which may be used by different actors for various purposes. A red team may use remote access techniques that provide persistent access to an exploited target for the purposes of reconnaissance and lateral movement across the network. A systems administrator may use remote access to perform day to day operations on a network accessible computer. An array of techniques exist to obtain and maintain remote access across a network, including using a command and control server such as Cloud C². Common remote access techniques include reverse shells and may employ obfuscation techniques to mask the connection. See all remote access payloads.

This payload is for the Key Croc, a keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. It's the ultimate key-logging pentest implant.

Submit your own payload, or browse more featured Key Croc Payloads.

 

 

Related Payloads

Linux Blind Serial Command Injection
Linux Blind Serial Command Injection
Allows a remote attacker to execute commands on a Linux system via a serial connection, without receiving feedback on th
Read More
Linux Keystroke Reflection
Linux Keystroke Reflection
Implementation of the "Keystroke Reflection" technique for file exfiltration.
Read More
BlueBunny
BlueBunny
BlueBunny is a C2 solution that communicates directly over Bluetooth-Low-Energy with your Bash Bunny Mark II. Send your
Read More