Linux TTY Shell Cheat Sheet
Source https://steflan-security.com
Last updated
Source https://steflan-security.com
Last updated
During a penetration test, when obtaining access to a remote Linux host via a reverse/bind shell, it can be very painful to issue certain commands over it and it is often a much better option to obtain an interactive shell. These are the main reason why this is a good idea:
More shell stability, as things like CTRL+C will no longer close down the connection.
Ability to use up, down, left, and right arrows to navigate through and modify commands.
Ability to use applications or commands that use a login prompt such as Sudo, MySQL, SSH, etc.
Ability to use tab-auto completion in commands.
Ability to view commands, output, and file contents in the same terminal size as the host machine.
This article will list the various commands that can be used to obtain a TTY shell and also how to turn it into a fully interactive shell.
The following table contains commands to execute in various scripting languages and tools to
The commands used above can also be issued with sh or /bin/sh, rather than bash or /bin/bash, if BASH is not an option. Once a TTY shell has been achieved, the following commands can be used in order to obtain a fully interactive shell:
Having a fully interactive shell can help immensely while enumerating a given host, performing post exploitation techniques and attempting to escalate privileges, and as most Linux systems come with Python or other scripting languages already installed, obtaining one should be fairly effortless.
Command
Description
Shell to Bash TTY shell
Python BASH TTY shell
Python 3 BASH TTY shell
Echo BASH TTY shell
BASH TTY shell
Perl BASH TTY shell
Ruby BASH TTY shell
Lua BASH TTY shell
IRB BASH TTY shelll
Vi/Vim BASH TTY shell
Vi/Vim BASH TTY shell
Nano BASH TTY shell
Nmap BASH TTY shell