sure, either here or on discord
Guys i need help with the reverse shell. I already managed to exploit the machine and got the user flag. All the rev shell payloads that iāve tried donāt seem to work.
The way iām currently doing things is piping the output of the commands to the nc command. Which becomes very tedious after a while.
why not skip that step and go for the next one regarding access directly?
Hey machine website i found is not open on browser please anybody help me!!!
try do a nmap
i tried on 5***5 but no response from webste
Maybe you tried while machine was resetting. Try again.
I might need a nudge getting rev shell. out of options after hours of trying.
Rooted. Thanks to @5105 , @lim8en1 and @panda08s for the tips on the foothold.
PrivEsc user to root is really easy.
Feel free to DM me as i will try to answer your DMs
hi bro got the attack vector, but not able to excute can you tell how perform attack ?
can you tell me about the foothold?
Pretty sure I have the attack vector but stuck in a loop. Not sure how to get further anyone DM a little advice?
Hi guys. Everybody just telling about second serviceā¦ Iām stuck canāt find it, is it just wrong dictionary I used or here is the other way to find this service?
Try to understand what S*** is really capable of doing.
Google it out and try out on most obvious locations there are.
I think something wrong with this machine right now. Because i am pretty sure i could see the m******l login page before. But now it simply gives 401 unauthorized access failure. Did someone with admin privileges changed the page rules?
Read about SSRF
i also see the page with a 401
Anyone can help me with getting anything else than the request headers with the vulnerability?
hi everyone im stuck on the SF i got it to do a get to my python server but i cant read anything from the local machine | edit: look for sf to rce but it is not possible, I also tried s**f to access the local network but it does not allow me to do so, it only makes the request but I do not receive a response
I cant connect to the web application, it just keeps loading, I cant curl it either. Did anyone have the same problem? Also on my nmap scan it says that port 80 is āfilteredā instead of āopenā.