KategorilerUncategorized

Squashed HTB Writeup

Nmap result is the below 🙂

I meet new ports at my OSCP process.

I search at the internet how I can abuse the vulnerability .

I find which driver can I mount it and I find

I mount it.

I create a user that it can open the directory.

I create a php file to use webshell.

It success and I get the reverse shell.

To be countinued to privesc :).

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir