the_hutch

Forum Replies Created

Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • #53209
     the_hutch 
    Participant

    Thanks Don and Phil. Good to be here. I can already tell that the quality of technical posts here is way higher.

  • #53200
     the_hutch 
    Participant

    Yeah….as the new guy around here, I should probably at least read the entire post before firing back replies and stepping on peoples toes, lol.

  • #53206
     the_hutch 
    Participant

    Thanks guys. You can probably expect to see me around quite a bit. Honestly, this is probably a better fit for me anyways. As I’m an infosec guy…and that is only a small portion of the forums over there.

  • #53198
     the_hutch 
    Participant

    You’re right…my bad. Jumped the gun on that one…

  • #53048
     the_hutch 
    Participant

    @hanyhasan wrote:

    Privilege escalation =  g0tma1k have a nice article about it and every one recommend it

    Second this. Highly recommend this article for intelligent privilege escalation in a linux environment. Helped a lot.

  • #53127
     the_hutch 
    Participant

    OSCP = Best security course I’ve taken so far

    OffSec recommends basic understanding of TCP/IP and Linux as pre-requisites. If you fit that bill, I’d say you should be good to start.

  • #53195
     the_hutch 
    Participant

    Don’t know why people are asking for exploit code on this one. OP obviously has a working exploit if the payload was executed (as evidenced by the open port 4444). The problem is somewhere in the post-exploitation connection attempt.
    The only thing I can think of is possibly a firewall sitting between you and the remote system that is white-listed (so drops all incoming connections to ports that are not in standard use on the network). Or a hardened host-based firewall, if target is windows system.

  • #53092
     the_hutch 
    Participant

    I feel like I’ve seen this discussion elsewhere, lol.

Viewing 8 posts - 1 through 8 (of 8 total)

Copyright ©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?