yeah
Hey guys, I’m like completely new to this period. Would someone be willing to PM me to help me out a little with some tips?
Will mention that the initial CIF exploit has been pretty exhausted here. Take a look back at some of the first 20-30 posts. If still have issue with it DM me.
guys pls sm1 can help me to exploit aiohttp vuln it keep giving me code 403 forbidden error
Elaborate, are you trying to access it on your browser? have you tried curl?
If you have a POC you are using, modify it to target other folders that better suit your target
Hi all! I’m stuck at the PoC upload. Can I DM someone in order to receive help? Thank you!
yes dm me, im free!
you need to run it within the victim machines with r### creds and make some changes in the exploit itself.
when you are able to run the exploit and see the results , you will understand what you need to change
Successfully owned this machine.
Some hints:
- cif file payload for revershell shell is available on internet, try searching for CVEs.
- user rosa’s cred are stored in database. just look for it.
- for root flag, you don’t have to be root exactly, look for all open ports ( netstat ), then forwarding the page, some nmap scan with CVEs and you can download the flag file.
bash ./payload.sh
[+] Testing with /assets/…/etc/passwd
Status code → 404
[+] Testing with /assets/…/…/etc/passwd
Status code → 404
[+] Testing with /assets/…/…/…/etc/passwd
Status code → 200
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
exploit.sh payload.sh user.txt
rosa@chemistry:~$ bash exploit.sh
[+] Testing with /assets/…/root/root.txt
Status code → 404
[+] Testing with /assets/…/…/root/root.txt
Status code → 404
[+] Testing with /assets/…/…/…/root/root.txt
Status code → 200
je ne suis pas sur bash ./payload.sh create exploit.sh ?
If you want to log in as root download /root/.ssh/id_rsa
I got the user flag but I can’t get the port forwarded to see / gain access to the running service. I either need higher permissions or when I try with with “ssh -L …” command I get a failed message. Any tips??
Hey there guys, i got the user, also i forwarded the running service to localhost but not I’m stuck. Can you please drop any hints. I also read previous discussions but i don’t get exactly what to look for
Really Really I love you man, thank you are the best.
if you have a shell, look for listening ports on the machine “ss -tulpn” should help you.
Didn’t even think about that… thanks for the good info!
I stuck with running exploit using cif file. I don’t understand why am I constantly getting 500. Can anyone help me pls?