Bypass Linux Restrictions
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Common Limitations Bypasses
Reverse Shell
Short Rev shell
Bypass Paths and forbidden words
Bypass forbidden spaces
Bypass backslash and slash
Bypass pipes
Bypass with hex encoding
Bypass IPs
Time based data exfiltration
Getting chars from Env Variables
DNS data exfiltration
You could use burpcollab or pingb for example.
Builtins
In case you cannot execute external functions and only have access to a limited set of builtins to obtain RCE, there are some handy tricks to do it. Usually you won't be able to use all of the builtins, so you should know all your options to try to bypass the jail. Idea from devploit. First of all check all the shell builtins. Then here you have some recommendations:
Polyglot command injection
Bypass potential regexes
Bashfuscator
RCE with 5 chars
RCE with 4 chars
Read-Only/Noexec/Distroless Bypass
If you are inside a filesystem with the read-only and noexec protections or even in a distroless container, there are still ways to execute arbitrary binaries, even a shell!:
Bypass FS protections: read-only / no-exec / DistrolessChroot & other Jails Bypass
Escaping from JailsReferences & More

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Last updated