Json

Type your comment> @dlh61 said:

Great!
You could first try simple movements such as trying to get a signal back, download to common folders or so and then go to more sophisticated commands knowing a bit more such as writable and callable functions available.

I started with a ping but from a ping to a shell there is a long way.
It also all depends on what protection is activated on the target and how you can bypass it, if an AV prevents you from writing to disk and execute, etc. Not sure in this case as I do not have full access to the machine yet. Overall every box here is a great learning experience. D**********n is a tough topic for me as I don’t know/like java or .net