Thanks, I registered and then it was just the next thing it said to do Haha. I’ll have a look at the starting point labs. I’m near the end of the Doctors ~ Stuck on Injection without saying too much.
Thanks, I registered and then it was just the next thing it said to do Haha. I’ll have a look at the starting point labs. I’m near the end of the Doctors ~ Stuck on Injection without saying too much.
Ok. What you need to do is make sure you’ve done enough enumeration to fully understand what gets processed where. You need to make sure you have looked at all the responses from the server to have an idea of what types of injection are likely, then try them.
Once you work out the right type, there are online payloads which work perfectly to get you a shell. (Albeit with minor modifications)
Hi,
Can someone help me get shell?
I know the right exploit, and I know how to trigger it. I can execute commands with it and get the output. But if I try to run reverse shell command, I don’t get any connection. I am able to send output of commands to my nc, but not the shell. Have tried different shells but without any luck.
Hi,
Can someone help me get shell?
I know the right exploit, and I know how to trigger it. I can execute commands with it and get the output. But if I try to run reverse shell command, I don’t get any connection. I am able to send output of commands to my nc, but not the shell. Have tried different shells but without any luck.
It was simple mistake, because of which I wasted a lot of time to get shell. User part was straight forward, just enumerate. And root took a while to notice, just remember what was on the nmap. But I finally got root. Thanks everyone!