Linux TTY Shell Cheat Sheet

Source https://steflan-security.com

Introduction

During a penetration test, when obtaining access to a remote Linux host via a reverse/bind shell, it can be very painful to issue certain commands over it and it is often a much better option to obtain an interactive shell. These are the main reason why this is a good idea:

  • More shell stability, as things like CTRL+C will no longer close down the connection.

  • Ability to use up, down, left, and right arrows to navigate through and modify commands.

  • Ability to use applications or commands that use a login prompt such as Sudo, MySQL, SSH, etc.

  • Ability to use tab-auto completion in commands.

  • Ability to view commands, output, and file contents in the same terminal size as the host machine.

This article will list the various commands that can be used to obtain a TTY shell and also how to turn it into a fully interactive shell.

Cheat Sheet

The following table contains commands to execute in various scripting languages and tools to

Command

Description

Shell to Bash TTY shell

Python BASH TTY shell

Python 3 BASH TTY shell

Echo BASH TTY shell

BASH TTY shell

Perl BASH TTY shell

Ruby BASH TTY shell

Lua BASH TTY shell

IRB BASH TTY shelll

Vi/Vim BASH TTY shell

Vi/Vim BASH TTY shell

Nano BASH TTY shell

Nmap BASH TTY shell

Obtaining a Fully Interactive Shell

The commands used above can also be issued with sh or /bin/sh, rather than bash or /bin/bash, if BASH is not an option. Once a TTY shell has been achieved, the following commands can be used in order to obtain a fully interactive shell:

Conclusion

Having a fully interactive shell can help immensely while enumerating a given host, performing post exploitation techniques and attempting to escalate privileges, and as most Linux systems come with Python or other scripting languages already installed, obtaining one should be fairly effortless.

Last updated

Was this helpful?