Official TheNotebook Discussion

Type your comment> @TazWake said:

Foothold and User were relatively straightforward.

  • Interception and tampering
  • then enumeration.

I am currently hitting a wall on root though. I think I have the right exploit to use (and it seems to work) but the payload isn’t throwing a shell. On the plus side, go is a really easy to understand language.


Finally resolved it. Turns out I just needed to change the thing I was calling.

I have the same problem as you:“I think I have the right exploit to use (and it seems to work) but the payload isn’t throwing a shell.”
How did you resolve it?