OpenAdmin

Type your comment> @TazWake said:

@Tempuslancien said:

Hello Guys,

Can you please help me in PV?
I tried Enum with metasploit or Python Enum script on ssh.
None of them worked…
Python tells me server is maybe patched…

If you are looking for the initial foothold:

Manual enumeration is the key. Use a tool to find the directories, then visit them. Look at the links and see if anything exploitable appears.

When you find something vulnerable, use an RCE to issue commands. From here enumerate further - again manually is probably the key unless you are 100% confident you know what you are looking for.

When you get that, you are first user. More manual enumeration will get you a way to become the second user.

Then you can either continue manual steps or run an enum tool to find out how to become root.

Ok than you TazWake.
Thank you also to EvilT0r13 and Blacknuxx is PV.
What is an RCE?
Well I probably understand I miss about steps and processes to execute in order to perform manual enumeration till the end…
Does someone has a little how to like a cheatsheet with steps and tools to manually process in a recurrent way during a pentest after and before access ? I have cheat for lots of things but not this one.

Regards,
Tempus