-
A recent hackitivty from www.tryhackme.com that I had a lot of fun with. Since this is a recent /live challenge I will edit out certain details.
Start off by deploying the box and receiving our IP…
-
-
-
Since the **rego** rules are used to discover potential misconfigurations on the system, my idea was to create a rule that checks for the well know **GTFOBins**.
The **GTFOBins** are Unix binaries th…
-
ssh, nc/ncat/socat/openssl, bash /dev/tcp redirects, et al can be used to forward ports to access more systems.
If you have a 3-machine ssh-chain, say A->B->C, where B->C is a forced ssh command, t…
-
I noticed that gokart supports checking for command injection. Another related thing is when injecting command-line parameters allows you to inject parameters that get interpreted as options. Some opt…
pabs3 updated
3 years ago
-
-
## Overview
Hi all!
As the development team behind **host-scanner**, we greatly value the feedback and ideas of our users. Your contributions have been instrumental in shaping the tool and making …
-
## Bug Description
While trying to upload or download a file to which we have access through `euid` or `egid`, `pwncat` shows an access error.
## pwncat version
```bash
$ pwncat --version
0.4.3…
-
## Bug Description
I am unsure if this is a bug or it is not supported by pwncat, so I am posting this to clarify and check.
I am unable to establish a reverse shell from any windows machine with nc…