Just a warning, i had both the valid exploit with valid shellcode, when the machine has just been reset it works fine, but any other time it just doesn’t connect back.
So just be aware, just because its not connecting or stable doesn’t mean you are doing it wrong, it COULD be the machine… or it could be your shellcode. So if you aren’t sure, install the software locally to test and confirm.
I am stuck on the epxloit. I found the ports, and the exploit in python which use a simple shell code. I generate another one with msfvenom but doesn’t work. Can some one help me please? This is my first challenge here and I am really lost
For the people who still have problems with the payload, you do not need to make
sessions migration. ShellPayload is enough to become user and root .. find the right
payload and change advanced option ... then you have it
Just rooted a few minutes ago. I used the python exploit and generated a shellcode with msfvenom. You don’t need to change the encoding but the payload. You can also give the payload some parameters like host and port. Read, how you can use msfvenom.
And a fresh reset might help setting up a reverse shell.
Can anyone help with what payload I should be using? I’ve tried all of the ones that make sense, and each one dies immediately. Just don’t want to keep reseting this box and throwing out exploits if there’s something I can look into to help me understand why none of these exploits are working. Also, I keep seeing people mention something about changing an advanced option for the payload.