The name of the machine is a hint as to what exploit you will need to use. Think of something released fairly recently. Was all over the news when it was released
SNMPWalk will output the address in integer form. To help you enumerate, take a valid IPv6 address from another machine on the network and convert it to integer. Using that information, it will help you find the data in the SNMPWalk output.
(Quote)
The majority of connect back shells should work fine. I meant nc as the listening service on the local machine. Refer to the netsec.ws link that @sajkox posted to see other options.
Yes it is useful. It is a combination of what you found and bypassing the restrictions/filters. Mess around with it while passing unrestricted data to see how it works, then focus on bypassing the restrictions.
Knowledge of OWASP top 10 is very helpful. PHP knowledge is also helpful on a large portion of the boxes.
Get familiar with Linux if you aren't already, as you will need to be able to notice things that are not part of a default Linux installation.…
Running a quick scan to start is a good idea. Once that is done, start a full scan while you check out what the first scan found. The majority of boxes only have services found with the quick scan, so it should be good in most cases.
(Quote)
The path to ColdFusion is optional, in the example it links to the jsp payload file. That path is used if the CFIDE directory is not in its default location.
www-data is not the intended entry method, although it is possible (just waaaay more effort, and different esc method). I don't want to spoil, but there is a known exploit that works from www-data (so I've been told, haven't done it myself). Take a …
I usually use Apache as it is also built into Kali and doesn't require a terminal window to be left open. Also I have accidentally started SimpleHTTPServer in the wrong directory in the past and want to minimize exposure of the rest of my machine. A…
I suggested this a few months ago. It is a bit soon yet, but I could definitely see it if we could get some good material together and a private lab for certifications, after we grow some more. Who knows what the future might bring :)