the_hutch

Forum Replies Created

Viewing 7 reply threads
  • Author
    Posts
    • #53209
      the_hutch
      Participant

      Thanks Don and Phil. Good to be here. I can already tell that the quality of technical posts here is way higher.

    • #53200
      the_hutch
      Participant

      Yeah….as the new guy around here, I should probably at least read the entire post before firing back replies and stepping on peoples toes, lol.

    • #53206
      the_hutch
      Participant

      Thanks guys. You can probably expect to see me around quite a bit. Honestly, this is probably a better fit for me anyways. As I’m an infosec guy…and that is only a small portion of the forums over there.

    • #53198
      the_hutch
      Participant

      You’re right…my bad. Jumped the gun on that one…

    • #53048
      the_hutch
      Participant

      @hanyhasan wrote:

      Privilege escalation =  g0tma1k have a nice article about it and every one recommend it

      Second this. Highly recommend this article for intelligent privilege escalation in a linux environment. Helped a lot.

    • #53127
      the_hutch
      Participant

      OSCP = Best security course I’ve taken so far

      OffSec recommends basic understanding of TCP/IP and Linux as pre-requisites. If you fit that bill, I’d say you should be good to start.

    • #53195
      the_hutch
      Participant

      Don’t know why people are asking for exploit code on this one. OP obviously has a working exploit if the payload was executed (as evidenced by the open port 4444). The problem is somewhere in the post-exploitation connection attempt.
      The only thing I can think of is possibly a firewall sitting between you and the remote system that is white-listed (so drops all incoming connections to ports that are not in standard use on the network). Or a hardened host-based firewall, if target is windows system.

    • #53092
      the_hutch
      Participant

      I feel like I’ve seen this discussion elsewhere, lol.

Viewing 7 reply threads

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?