First Contact
Get a reverseshell
We have identified a potential attack surface that we can use to execute php and shell commands on. We are able to execute a reverse shell on the web shell in order to get a shell back on the machine.
Uploading a php Reverseshell
For the PHP reverse shell, we’ll be using Pentest Monkey’s reverse shell found here or in kali under /usr/share/webshells/php/php-reverse-shell.php
Modify the reverse shell to your tun0 IP address and port.
Paste php code into webshell. Note: First line <?php and last line ?> needs to be removed
start netcat listener on port 53
Execute reverseshell

Problem with netcat listener on port 53

Kill systemd-resolv process and start netcat listener again
Execute the reverseshell:


To answer the questions and find the flag I need to focus myself on logs
Searching for logs: cd /var/log


Getting the root flag

Additional way to get a reverseshell

Questions

Last updated
Was this helpful?
