I’ve got my low level privileged user, identified the exploit in the script, however whenever it executes, my nc session dies as soon as the reverse connection is made. Would really appreciate a PM, I’ve tried mixing up my reverse shell script, but it always immediately dies.
I’m a noob. I don’t see anyone else mention they are having difficulty port-scanning this box… I’ve run at least half a dozen different nmap scans, except a UDP scan of ALL ports(waiting on one). All scans have reported that all ports are filtered, this has remained across box resets… I’m always up for a challenge, but want to make sure this is meant to be happening?
EDIT: Oddly enough, I now AM able to scan the box, 24hrs later… and no ports are coming back as filtered… I couldn’t see any ports before, nor visit the site, but now it’s working. Very odd.
I had similar issues at the beginning. The reason you see filtered ports is because either your ovpn isn’t connected or something with your connection.
Hey I was wondering if anyone was having issues with the u***** page. Every time I try it just loses connection when trying to u***** any type of p** or j** just for testing.
need some help, i now how to get into user but my shell instantaneously dies. is using the :two-letter-tool myip myport: enough?
I had the same problem for hours… double check what you’re using after that PORT number… there’s an important difference between -e and -c on the command you want run after the connection is made.
need some help, i now how to get into user but my shell instantaneously dies. is using the :two-letter-tool myip myport: enough?
I had the same problem for hours… double check what you’re using after that PORT number… there’s an important difference between -e and -c on the command you want run after the connection is made.
I get -c to work but can’t get -e to work for a full reverse shell without it dying. any more hints on the actual payload?
need some help, i now how to get into user but my shell instantaneously dies. is using the :two-letter-tool myip myport: enough?
I had the same problem for hours… double check what you’re using after that PORT number… there’s an important difference between -e and -c on the command you want run after the connection is made.
I get -c to work but can’t get -e to work for a full reverse shell without it dying. any more hints on the actual payload?
isn’t c enough? its working for me till now. still not root but i can work with -c
Without trying to give too much away…
Look at the characters you can enter without stopping the script from progressing. Then take advice that’s already been said, try to fuzz the input, but not necessarily with many characters.
Let the script finish and pay attention to the error messages.
You will get different errors based on your input. Once you get that it should be pretty clear.
Without trying to give too much away…
Look at the characters you can enter without stopping the script from progressing. Then take advice that’s already been said, try to fuzz the input, but not necessarily with many characters.
Let the script finish and pay attention to the error messages.
You will get different errors based on your input. Once you get that it should be pretty clear.