Official Buff Discussion

priv esc - port forwarding is a waste of time IMHO. Build the exploit on a windows machine with the py tool is the way to go. I did both plus You will need to know how to craft an executable from a script, at least on the OSCP. Trying to run the privesc through a tunnel might expose your IP address. Just move the .ex* the same way you did to upgrade your shell initial user shelluse the telepa**& :smiley: . After you craft your py into an ex* on a windows machine. You will have to listen at your port from the “venom shell” you created. Google a tutorial if you don’t know how to do it. Let me know if this is too much of a spoiler.