Problem in Exploiting Web Vulnerabilities in Thick-Client Applications in attacking common apps

hey i am doing the updated module of attacking common apps and i am now in fatty and i get admin but i get incorrect answer when i enter the content of uname what am i doing wrong? that what i got Lin****

1 Like

Linux 03dcd3e5e277 4.9.0-11-amd64 #1 SMP Debian 4.9.189-3+deb9u1 (2019-09-20) x86_64 Linux

This is what I got too.
I guess @admins @moderators need to check this out.

you guys need to select ipconfig/ifconfig, instead of the first option shown in the screen shot if i remember correctly

For some reason, I get to the point where I create the fatty-client-new.jar and when I double click it, nothing happens. I followed the process of removing the hashes and modifying the beans.xml file with the port 1337 as indicated in the lesson. Does anyone know why this doesn’t work?


Hi, same problem here. Even can’t scan the app connections with wireshark. Did you solve it?

Same problem…
Even when lanuched the connect button dont work at all.

Solution found: Don’t make any changes to the MANIFEST.MF. Rest of the steps are the same.