PenTest.WS Documentation
  • What is PenTest.WS?
    • Tier Comparison
  • Getting Started
    • Dashboard
    • Creating An Engagement
    • Main Window Layout
    • Engagement Console
    • Import Nmap & Masscan XML
    • Port Scan Templates
    • Adding Hosts Manually
    • Adding Ports to Hosts
    • Capturing Credentials
  • Hosts & Services
    • Host Page
    • Port Page
    • Global Service Notes
    • Service Command Library
    • Default Service Checklist
    • Scratchpad Editor
  • People & Events
    • People Hacking
    • Events Timeline
  • Views & Filtering
    • Boards
    • The Matrix
    • Subnetting
  • User Libraries
    • Shells Library
    • General Command Library
    • General Notes Library
    • Bookmark Library
  • Built-In Tools
    • Echo Up
    • CyberChef
    • Venom Builder
  • Search Capabilities
    • CVE DB
    • Exploit-DB
    • Nmap Scripts
    • Metasploit Modules
    • Keyword Search
  • Findings
    • Findings Admin
    • Findings Library
    • Engagement Findings
  • Clients & Reporting
    • Write-Ups
    • Clients Manager
    • Reporting Templates
    • Generating Deliverables
  • Collaboration
    • User Maintenance
    • Shared Engagements
    • Access Control List
  • Automation & Integration
    • API
    • SMTP
  • Authentication
    • Two-Factor Authentication
    • LDAP Authentication
  • Exporting & Importing
    • Export Account Items
    • Import Account Items
    • Export to CSV / JSON
  • Pro Tier
    • Admin Panel
    • Intranet Mode
    • Solo Mode
    • Large Engagement Support
Powered by GitBook
On this page
  • Base 64 Techniques
  • B64 bash
  • B64 cmd
  • B64 Powershell
  • Quote Conversion Techniques
  • Single Quoted
  • Double Quoted
  • No Quotes
  • Tier Availability
  1. Built-In Tools

Echo Up

PreviousBookmark LibraryNextCyberChef

Last updated 2 years ago

URL:

The Echo Up tool is useful for creating files on remote servers when you only have access to a terminal interface, either through a bash reverse shell or powershell remoting.

On the left side of the screen you can manually enter file contents or use the Load File button to read in a local file. As you type, the right side of the screen will create a list of shell commands to build the file on the remote server by using a number of techniques.

Base 64 Techniques

The following examples will encode "Hello World" and generate a "helloWorld.txt" file.

B64 bash

Linux - echos the payload to base64 and uses bash output redirection

echo -n 'SGVsbG8gV29ybGQ=' | base64 -d > helloWorld.txt

B64 cmd

Windows - uses certutil and cmd variables to generate a file

del /Q helloWorld.txt
del /Q froqwcxj
echo|set /p="SGVsbG8gV29ybGQ=" >> froqwcxj
certutil -decode froqwcxj helloWorld.txt
del /Q froqwcxj

B64 Powershell

Windows - powershell script using local variables and System.Convert

del helloWorld.txt
$boizakxl = @()
$boizakxl += [System.Convert]::FromBase64String("SGVsbG8gV29ybGQ=")
[Environment]::CurrentDirectory = (Get-Location -PSProvider FileSystem).ProviderPath
[System.IO.File]::WriteAllBytes("helloWorld.txt", $boizakxl)
Remove-Variable boizakxl

Quote Conversion Techniques

These examples parse the file contents converting single quotes to double quotes where needed. The file contents of the following examples is:

This is a "test" of the application's Echo Up feature.

Single Quoted

Wrap the file contents in single quotes and convert inner single quotes to a series of single quote, double quote, single quote, double quote, single quote.

echo 'This is a "test" of the application'"'"'s Echo Up feature.' > helloWorld.txt

Double Quoted

Wrap the file contents in double quotes and convert inner double quotes

echo "This is a "'"'"test"'"'" of the application's Echo Up feature." > helloWorld.txt

No Quotes

Do not convert the file contents.

echo This is a "test" of the application's Echo Up feature. > helloWorld.txt

Tier Availability

Echo Up is available on all tiers.

https://pentest.ws/tools/echo-up
Echo Up