Welcome to our walkthrough of Hetemit, a PG Practice machine: portal.offsec....
In this clip, we:
🟪 Demonstrated executing a reverse shell on port 80 using NC and bin Bash, successfully establishing a connection.
🟪 Discussed the need for a proper PTY shell and proceeded to use Python 3 to enhance the shell functionality.
🟪 Shifted to privilege escalation, suggesting the need to enumerate the machine after exploitation.
🟪 Examined an API script that ran Flask, identifying functions that handled GET and POST methods, noting vulnerable code sections.
Join OffSec Live on Fridays: / offsecofficial
We do demonstrations and walkthroughs of course topics and Proving Grounds machines. Additionally, sessions offer career guidance, including how to build a resume, how to break into #cybersecurity, and interview tips.
16 май 2024