Official Sightless Discussion

I tried to put the exploit but the Reverse shell is not connecting it just says connection from and then dies

Hi! Let me take a look at the reverse shell payload

1 Like

Just read the description of the CVE. You should find a link to a POC

1 Like

Hint for root? Donā€™t know what Iā€™m missing, is it related to Froxlor?

yes it is

2 Likes

Not sure how can I share the payload here because of the forum

Regards,
Parthiv

Make sure to try more than one payload. Also, try encoding it and/or simplifing it.

Is the hash of the user we** crackable? Or is there any other way to get into F******?

Can you share your discord so we can connect?

Any hints for the reverse shell? I got the POC payload, but not entirely sure how to use itā€¦

2 Likes

Im getting ECONNREFUSED anyone know what to do here?

1 Like

I donā€™t have the solution yet either, but I think this error message is not relevant to the solution. But Iā€™m not sureā€¦

1 Like

yea im still working on it.

I give up for today! I need some sleep and I will try tomorrow again to find the right revshell spellingā€¦ good luck everybody

1 Like

It is relevant, vuln is triggered by a parameter, yet the parameter is used at step X and the error come before reaching that step.

Tips 2 : Sometimes itā€™s better to exploit rce to download and execute binary with simple command than trying complex revshell payload.

1 Like

no flag in the user :open_mouth:

2 Likes

how did you find a subdomain, help me, its been a day, i am just running ffuf

Look at code

what wordlist did you use to find that subdomain, im having trouble finding one. been stuck at using ffuf