Official Atom Discussion

Type your comment> @Netpal said:

Hello everyone,

I’m stuck on the foothold and would appreciate some help… I have my .y** file and an .e**. I can see my file is getting downloaded on the server, but then nothing happens.
I’m using mvm to generate the payload and use mi/h***r to catch the revsh. I tried so many different payloads (with/without encoding (2-3 encodings)) and different ports, I don’t know what to do anymore :neutral:
(I’m using the flags -p, -f, -o (and -e when encoding)

Would any of you know what could be the cause?

Thank you and happy hacking!

When getting the foothole, you may have to play with the .**l file a bit. Don’t just follow the POC. Understand what the real vulnerability is. Then make your own exploit. Remember what a “null byte” is and that you have to remove bytes like them.

If you get stuck DM me.