From 49b79b77ac1d1f2b41c1c1b07fccc7e16d79a99d Mon Sep 17 00:00:00 2001 From: Alexandre ZANNI <16578570+noraj@users.noreply.github.com> Date: Sun, 19 May 2019 19:17:02 +0200 Subject: [PATCH] add install steps --- README.md | 22 +++++++++++++++++++++- 1 file changed, 21 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index cde7f79..f9a9a3c 100644 --- a/README.md +++ b/README.md @@ -1,14 +1,34 @@ # Chankro + Your favourite tool to bypass __disable_functions__ and __open_basedir__ in your pentests. ## How it works + PHP in Linux calls a binary (sendmail) when the mail() function is executed. If we have putenv() allowed, we can set the enviroment variable "LD_PRELOAD", so we can preload an arbitrary shared object. Our shared object will execute our custom payload (a binary or a bash script) without the PHP restrictions, so we can have a reverse shell, for example. ## Example: The syntax is pretty straightforward: -`python chankro.py --arch 64 --input rev.sh --output chan.php --path /var/www/html` +``` +$ python2 chankro.py --arch 64 --input rev.sh --output chan.php --path /var/www/html +``` Note: path is the absolute path where our .so will be dropped. +## Install + +### Git + +``` +$ git clone https://github.com/TarlogicSecurity/Chankro.git +$ cd Chankro +$ python2 chankro.py --help +``` + +### [BlackArch](https://blackarch.org/) + +``` +# pacman -S chankro +$ chankro --help +```