Fuel CMS CVE-2018-16763 | TryHackMe Ignite

preview_player
Показать описание
Room Link
-----
Receive video documentation
----
Do you need private cybersecurity training? sign up here
--
Twitter
LinkedIn
Instagram
Facebook
Рекомендации по теме
Комментарии
Автор

Thanks for this video.
Is there any reasons or process that you choose "Netcat OpenBsd" reverse shell?



I had tried a lot of reverse shell, same as you did.
By the way, Maybe at 13:50. This can't work, because it use sh (From "echo ${0}") (Not prettry sure)

darkgrouptw
Автор

how about using cd / && cat /home/ubuntu/flag.txt to get the flag without rev shell

takistakou
Автор

Thank you for your writeup.
It helped me with setting up exploit for Fuel CMS 1.4 and with getting reverse shell.
Also I would like to ask you about your desktop, is it KDE and did you tweak it ?

MarcinGorski
Автор

As an expert, in general do you think that php(lamp/lnmp) is less secure then node.js?

amigaworkbench
Автор

HAHAHA you had it working like halfway in the video except there was a " in front of your command you didnt see so the command didnt work.. then you went on a whole deal trying to upload a php file to the server and finally 15 minutes later you try that command again and it worked.. lol That was painful!! goto 18:02 .. The " gotcha!!

DNozz