I tried to put the exploit but the Reverse shell is not connecting it just says connection from and then dies
Hi! Let me take a look at the reverse shell payload
Just read the description of the CVE. You should find a link to a POC
Hint for root? Donāt know what Iām missing, is it related to Froxlor?
yes it is
Not sure how can I share the payload here because of the forum
Regards,
Parthiv
Make sure to try more than one payload. Also, try encoding it and/or simplifing it.
Is the hash of the user we** crackable? Or is there any other way to get into F******?
Can you share your discord so we can connect?
Any hints for the reverse shell? I got the POC payload, but not entirely sure how to use itā¦
Im getting ECONNREFUSED anyone know what to do here?
I donāt have the solution yet either, but I think this error message is not relevant to the solution. But Iām not sureā¦
yea im still working on it.
I give up for today! I need some sleep and I will try tomorrow again to find the right revshell spellingā¦ good luck everybody
It is relevant, vuln is triggered by a parameter, yet the parameter is used at step X and the error come before reaching that step.
Tips 2 : Sometimes itās better to exploit rce to download and execute binary with simple command than trying complex revshell payload.
no flag in the user
how did you find a subdomain, help me, its been a day, i am just running ffuf
Look at code
what wordlist did you use to find that subdomain, im having trouble finding one. been stuck at using ffuf