Hi, anyone has a tip to reverse shell from the RCE. I don’t have success in it, tried so many things. No success in developing a ssh access too.
Don’t forget the encoding if your payload contains spaces, and make sure you place the payload correctly.
use a command line shell in your payload and regarding the software is running on you know which one to use
I just found m******l and I feel like the dumbest person ever how long it took me, I kept spamming totally wrong targets
same
@yelbirb @bartukilickaya
there are multiple steps you need to complete in order to get foothold
I know but I have 0 idea on what are those steps, rn im just messing with burpsuite trying to achieve smth based on my research but with no success. Any tips I am really stuck
Same, I’m sure its something stupid but i don’t get it
People were talking about a PoC but as far as I am aware there isn’t one for this vuln
There is
Once you found the initial vulnerability, do the most basic enumeration that can do with that type of vulnerability… that’ll lead you to the next step…
So I think I haven’t found the vulnerability, I though it was the S**F
you are on the right path
There doesn’t seem to be anything wrong with the request tho’
Any tips on exploiting the m******l, I found only one single POC.
Also any tips about the dorks you guys are talking about are appreciated.
Thanks!
Can I PM you?
bro where did you even find a PoC?
Enumerate the machine but also look around the website for any clues.
That will lead you on the right path. After that just google.