Reverse Shell

  • A file upload vulnerability in a web application occurs when the application improperly handles user-uploaded files, allowing attackers to upload malicious files. Create a Reverse Shell Script In this step, a reverse shell script from Github (https://github.com/pentestmonkey/php-reverse-shell/blob/master/php-reverse-shell.php) was used. <?phpset_time_limit…

  • Definition File Inclusion is a type of vulnerability often found in web applications, where an attacker can cause the application to include files from the server or from external sources. This inclusion can lead to a variety of malicious actions,…

  • Windows XP was released by Microsoft on October 25, 2001. It quickly became one of the most popular operating systems worldwide due to its user-friendly interface and stability. However, as of April 8, 2014, Microsoft ended support for Windows XP.…

  • This HTB machine covers exploiting CVE-2021-44228. During the session, the following IP Address information were assigned:Target Machine: 10.129.148.129Attacker Machine (in Tun0 Interface): 10.10.14.118 EnumerationUse NMAP to enumerate services that are running in the target machine. During the enumeration, it was…