Hi ! Once more a nice room, but there were two little typo that could get people into troubles :D First one is at 9.6.1 in the command to get a reverse shell, you added a "\" at the end of the command that gives an error when you try to pop the shell ( "0\>&1" --> "0>&1" ) Second one is at 9.6.2 in the "nc -lvnp 444" command that is displayed as 4444 on your screen but 444 on the text PS : Is there anywhere I can send some little reports like this one instead of yt comments ?
@jacobweaver85053 жыл бұрын
I cant seem to get a shell My listener has been running for a solid 10 minutes now and i got nothing after replacing backup.sh after reworking it. anybody else have this issue?
@bravemiata29504 жыл бұрын
Not getting any response from listener, not even in the AttackBox. Been checking for hours. Still, I'm learning so much idrc, keep up the great content!
@babayaga42194 жыл бұрын
I had the same problem, turned out to be the file permissions: It was uploaded with rw- permissions instead of r-x permissions. So what I did was using Filezilla to edit the file directly.
@SpookiePower4 жыл бұрын
I don't get how that I can stand in the ftp:public folder and write "put backup.sh", and that it know that it shall upload the backup.sh file from my computer to the ftp folder ?
@The_ænerys4 жыл бұрын
It's replacing the server's version by your local one, and as it's the same name it's just overwriting it. You can do the exact same thing with any of your local file and uploading it to the server, if there's already a file with the same name it will overwrite it, else it will just append the file to the current dir. The put command is looking for a local file to send it to the ftp server The get command is looking for a server file to send it to your local machine
@chicconumber14 жыл бұрын
when i tried uploading the backup.sh it outputs: local: backup.sh remote: backup.sh 200 PORT command successful. Consider using PASV. 553 Could not create file. any fix to this?
@tommy33774 жыл бұрын
Sounds like you need to enable passive mode, try typing 'PASS'
@bravemiata29504 жыл бұрын
A bit late, but: I tried ">put (file.sh) (file.sh)" and got the same error. Use ">put" instead, then input your local file.
@tejapolisetty38064 жыл бұрын
i think the last task was to get backup.sh scripts to run output the flag not you executing the cat flag.txt
@divyeshpatro69154 жыл бұрын
getting error "ftp: connect: Connection refused " installed ftp in kali too but faced same problem again and again. can anyone help?
@nashonightmare4 жыл бұрын
Did you connected to the vpn
@divyeshpatro69154 жыл бұрын
yes man
@jclongy78864 жыл бұрын
Thanks for getting this started everyday, Darksec.
@idoabitoftrolling21724 жыл бұрын
Good as always
@KaLata1234564 жыл бұрын
Great Video
@nashonightmare4 жыл бұрын
ls command doesn't work on the given vulnerable ftp server :( Error message : 500 Illegal PORT command
@tommy33774 жыл бұрын
Oshan check that passive mode is enabled, if not type PASS
@nashonightmare4 жыл бұрын
@@tommy3377 Thanks, this problem only occured in wsl2. Don't know why.
@nashonightmare4 жыл бұрын
First time I heard about passive mode thing ill figure out it. ❤️
@tommy33774 жыл бұрын
@@nashonightmare No problem, hopefully that fixes it
@s.covens56544 жыл бұрын
Looks very simple but the reverse-shell won't show up in my terminal... Connected to the VPN, payload well set up, payload uploaded on the right folder but nothing... Gonna try it later but it looks like I'm doing something wrong.
@DarkSec4 жыл бұрын
Check the spelling and syntax on the shell against the link in text to pentest monkey. There was a small typo for a bit there on the room
@s.covens56544 жыл бұрын
@@DarkSec Thanks for the reply ! I tried again with an attackbox on THM and it finally worked. For some reason it doesn't work when I'm listening with ncat on my computer.
@mattstorm3604 жыл бұрын
This feels simple to exploit and simple to clean. I know i didn't need to, but i put backup.sh back without the reverse shell.
@tejapolisetty38064 жыл бұрын
how you did that without ftp
@mattstorm3604 жыл бұрын
@@tejapolisetty3806 I used ftp. I just replaced the file with the original file.
@tejapolisetty38064 жыл бұрын
@@mattstorm360 am i confused here, ftp is fine thats how lab is directing us right. Then who used reverse shell for this lab
@mattstorm3604 жыл бұрын
@@tejapolisetty3806 What i did was FTP, switched the backup.sh script with a reverse shell. Then used the reverse shell to do the objective. existed the shell. Switched the backup.sh script with the original script. Finished lab.
@eli_the_crypto_guy4 жыл бұрын
@@mattstorm360 You need the reverse shell to read the flag, unless you downloaded the flag to your local host, FTP does not have a read command, e.g. cat, less, more