Hi guys I am new to all this. I am trying to exploit Jeeves pc. I have found open ports but am struggling to find what to do next. Any help please or pointers
Thanks
Hi guys I am new to all this. I am trying to exploit Jeeves pc. I have found open ports but am struggling to find what to do next. Any help please or pointers
Thanks
Anyone? Just a nudge to get me started!
Did you enumerate on the http ports that you found with for example dirbuster ?
No will try that thank you
Hi i used dirbuster and found a lot more. I think I need to upload so I can get a reverse shell but not sure how to. Could someone give me a clue or a PM please.
Thank you
jeeves port seems to of gone?
@tman said:
Hi i used dirbuster and found a lot more. I think I need to upload so I can get a reverse shell but not sure how to. Could someone give me a clue or a PM please.Thank you
try more Dr. google instead hints
thank you. what i meant on last port is port ****** is no longer open? does jeeves need a reset or something?
Any tips on getting the reverse tcp payload to execute?
@DaddyGuru04 which flag are you attempting to obtain ?
Just trying to get a reverse shell so I can get user
Look into this script: Pure Groovy/Java Reverse Shell · GitHub
There is a special place you can maybe put this, and use something like netcat to listen for it
I tried that one with no luck
Where did you put it ?
PM me
Scripts look there
anyone can hint at the privesc for jeeves? I got shell but suck at privesc overall and most of all in windows…
@v0idPtr said:
anyone can hint at the privesc for jeeves? I got shell but suck at privesc overall and most of all in windows…
enumrate what strange files you can find
I was able to retrieve the admin password from the the special .k file but i don’t know how to escalate privileges with using them any help would be greatly appreciated.
@str> @Strank said:
I was able to retrieve the admin password from the the special .k file but i don’t know how to escalate privileges with using them any help would be greatly appreciated.
This is where I am at. I was able to get a few passwords but not too sure what to do with them…