Foothold was easy for me
Root wasn’t as straight forward as for you. I’ve been trying for an hour until I finally got it.
My tip is, read what the program can do. What you have to use is pretty straight forward. Just make sure you use the correct language!
for some reason i’m not able to get a reverse shell. tried the oneliners and tried upload shell files in to the target machine the request doesn’t reach my python webserver. but still ping works… Any suggeestions?
for some reason i’m not able to get a reverse shell. tried the oneliners and tried upload shell files in to the target machine the request doesn’t reach my python webserver. but still ping works… Any suggeestions?
It depends on how you are trying to exploit it. At a guess, I’d say check how the quotation is set. If you are trying to send a one-liner by the command line, there might be lots of quotes needed, check how they are nested.
Hi. I got remote command injection with the exploit . Trying to get full tty shell with it. Having issues with netcat arguments. Can’t get the rest of the argument to work “-e /bin/bash” even with . netcat command works fine without out it but know bash shell.
I have been able to get a user flag but i am struggling with root flag… i have been able to find the ///***fe which can be exploited for privesc but i don’t know how to use if
Someone should please give me a nudge to the right direction
I have been able to get a user flag but i am struggling with root flag… i have been able to find the ///***fe which can be exploited for privesc but i don’t know how to use if
Someone should please give me a nudge to the right direction
Have a look at what it really is. It can run something you can create. The thing you can create can give you root.