https://twitter.com/syscall59 | email@example.com
Also, this machine has a version of proftd which contains a backdoor, so if you just use proftpd_133c_backdoor on metasploit, should work to, and you get a shell with uid=0 too XD
I wrote a similar blog about this, and you can find a few suggestions there ;)
Great tutorial ! ths…
Looking forward to the next one.
Hey there, here’s a quick bit of info about switches that are currently unauthenticated and serving traffic all over the place.
The Shodan dork for these is: https://www.shodan.io/search?query=eHTTP
Hey, i figured out.
I think it was a permission erro, i got this error when trying to upload somewhere else than temp folder.
A very good walkthrough!
I was trying it myself. Sadly I was not able to gain shell using plugin upload due to failure in uploading payload.
A detailed blog post on my reconnaissance processes for web applications security testing. I always wanted to write about this…