@Baz928 said:
Can someone PM be and explain why we need to use C***** or P****.
You dont. There are lots of other options.
I thought that when using a shell the commands are issued as if I was a local user
The commands you issue in the shell are issued from inside that shell, yes.
so I don’t quite understand why I can’t interact with the exploitable service directly.
You can. That is certainly one option. If you find a vulnerable service and can run the exploit from the remote shell, then that is the problem solved.
I think my understanding of how commands are remotely executed must be flawed.
If you want to send packets from a shell on your machine to a port listening internally on a remote machine, you have a networking issue to solve. You cant send packets from a terminal on your machine to a shell on the remote machine without doing something to allow this.