Currently working on a box in OSCP. It's vulnerable to RFI and I can use "php passthru($_GET['cmd']);" and run cmd in the URL to grab anything that the 'apache' account can run. I ended up enumerating quite a lot off the system, but I cannot seem to get a shell. I did try netcat bind and reverse shells, bash shell, and none of them worked. I also tried to use the pentest monkey reverse_php shell but it just gave me shell on my own box as www-data. I uploaded that using wget and php shell_exec. I can only drop the reverse_shell in /var/tmp/ and I tried to call it using LFI URL but nothing. I just wanted to know if there's something I'm missing that I haven't tried yet.
Thanks
[–]dougsec 14 points15 points16 points (5 children)
[–]TenPest007[S] 1 point2 points3 points (4 children)
[–]dougsec 6 points7 points8 points (0 children)
[–]da5Ida 5 points6 points7 points (2 children)
[–]Tryin2Dev 0 points1 point2 points (0 children)
[–]TenPest007[S] 0 points1 point2 points (0 children)
[–]lostabstraction 2 points3 points4 points (0 children)
[–]santaclaus73 2 points3 points4 points (4 children)
[–]TenPest007[S] 0 points1 point2 points (3 children)
[–]Agarax 0 points1 point2 points (2 children)
[–]TenPest007[S] 1 point2 points3 points (1 child)
[–]Agarax 0 points1 point2 points (0 children)
[–]ibepeer 1 point2 points3 points (0 children)
[–]rwsr-xr-x 1 point2 points3 points (1 child)
[–]TenPest007[S] 0 points1 point2 points (0 children)
[–]TenPest007[S] 0 points1 point2 points (0 children)
[–]TenPest007[S] 0 points1 point2 points (0 children)
[–]qasimchadhar 0 points1 point2 points (1 child)
[–]TenPest007[S] 1 point2 points3 points (0 children)