emptymonkey / revsh

A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
MIT License
458 stars 90 forks source link

macOS w/Brewed OpenSSL and MAN_DIR double slash #13

Closed ghost closed 7 years ago

ghost commented 7 years ago

Trying to make it work on macOS Sierra 10.12.6 to be used as a Controller

ghost commented 7 years ago

Nope Doesn't work :(

sudo dtruss revsh -c

dtrace: system integrity protection is on, some features will not be available
SYSCALL(args)        = return
open("/dev/dtracehelper\0", 0x2, 0x7FFF5B19A850)         = 3 0
ioctl(0x3, 0x80086804, 0x7FFF5B19A7D8)       = 0 0
close(0x3)       = 0 0
thread_selfid(0x3, 0x80086804, 0x7FFF5B19A7D8)       = 48547 0
bsdthread_register(0x7FFFB3B06080, 0x7FFFB3B06070, 0x2000)       = 1073741919 0
ulock_wake(0x1, 0x7FFF5B199E4C, 0x0)         = -1 Err#2
issetugid(0x1, 0x7FFF5B199E4C, 0x0)      = 0 0
mprotect(0x104A7A000, 0x88, 0x1)         = 0 0
mprotect(0x104A7C000, 0x1000, 0x0)       = 0 0
mprotect(0x104A92000, 0x1000, 0x0)       = 0 0
mprotect(0x104A93000, 0x1000, 0x0)       = 0 0
mprotect(0x104AA9000, 0x1000, 0x0)       = 0 0
mprotect(0x104AAA000, 0x1000, 0x1)       = 0 0
mprotect(0x104A7A000, 0x88, 0x3)         = 0 0
mprotect(0x104A7A000, 0x88, 0x1)         = 0 0
getpid(0x104A7A000, 0x88, 0x1)       = 5701 0
stat64("/AppleInternal/XBS/.isChrooted\0", 0x7FFF5B199D08, 0x1)      = -1 Err#2
stat64("/AppleInternal\0", 0x7FFF5B199DA0, 0x1)      = -1 Err#2
csops(0x1645, 0x7, 0x7FFF5B199830)       = -1 Err#22
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40
ulock_wake(0x1, 0x7FFF5B199DB0, 0x0)         = -1 Err#2
csops(0x1645, 0x7, 0x7FFF5B199110)       = -1 Err#22
getuid(0x1645, 0x7, 0x7FFF5B199110)      = 0 0
geteuid(0x1645, 0x7, 0x7FFF5B199110)         = 0 0
getgid(0x1645, 0x7, 0x7FFF5B199110)      = 0 0
getegid(0x1645, 0x7, 0x7FFF5B199110)         = 0 0
open("/dev/random\0", 0x0, 0x7FFF5B19B3F8)       = 3 0
dtrace: error on enabled probe ID 2134 (ID 154: syscall::read:return): invalid kernel access in action #12 at DIF offset 92
close(0x3)       = 0 0
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40
sigaction(0x14, 0x7FFF5B19BA08, 0x7FFF5B19BA30)      = 0 0
pipe(0x14, 0x7FFF5B19BA08, 0x7FFF5B19BA30)       = 3 0
pipe(0x14, 0x7FFF5B19BA08, 0x7FFF5B19BA30)       = 5 0
sigprocmask(0x1, 0x7FFF5B19B384, 0x7FFF5B19B380)         = 0x0 0
posix_spawn(0x7FFF5B19B39C, 0x7FFFB39AC46A, 0x7FFF5B19B280)      = 0 0
close_nocancel(0x4)      = 0 0
close_nocancel(0x6)      = 0 0
dtrace: error on enabled probe ID 2135 (ID 940: syscall::read_nocancel:return): invalid kernel access in action #12 at DIF offset 92
dtrace: error on enabled probe ID 2135 (ID 940: syscall::read_nocancel:return): invalid kernel access in action #12 at DIF offset 92
dtrace: error on enabled probe ID 2135 (ID 940: syscall::read_nocancel:return): invalid kernel access in action #12 at DIF offset 92
dtrace: error on enabled probe ID 2135 (ID 940: syscall::read_nocancel:return): invalid kernel access in action #12 at DIF offset 92
close_nocancel(0x3)      = 0 0
close_nocancel(0x5)      = 0 0
wait4_nocancel(0x1646, 0x7FFF5B19B398, 0x0)      = -1 Err#10
sigprocmask(0x3, 0x7FFF5B19B380, 0x0)        = 0x0 0
close(0x0)       = 0 0