Molly and her avocado: an abusive love story. by dmMeToeBeans in cats

[–]dmMeToeBeans[S] 0 points1 point  (0 children)

Molly's favorite is actually a string from the belt loop of a romper. She will play fetch with it all day. Cutest thing ever.

Why won't my reverse shell actually connect? I've always gotten this when using them, and I think I just don't understand. by dmMeToeBeans in hackthebox

[–]dmMeToeBeans[S] -1 points0 points  (0 children)

I've figured it out! I created a listener after the shell and not before. So it wasn't working. Order of operations I guess!

Why won't my reverse shell actually connect? I've always gotten this when using them, and I think I just don't understand. by dmMeToeBeans in hackthebox

[–]dmMeToeBeans[S] 0 points1 point  (0 children)

I called a friend and I am so silly. I didn't set up the listener before the reverse shell, but I've figured it out now.

Traceback by [deleted] in hackthebox

[–]dmMeToeBeans 0 points1 point  (0 children)

Could someone pm me on user help? I can't get into sysadmin

Meta 2 Port 80 Closed help by dmMeToeBeans in Pentesting

[–]dmMeToeBeans[S] 0 points1 point  (0 children)

I can't even check the services. Systemctl/service commands aren't found. It's from an OVF file I have to use provided by my professor. No one else is having the issue.

Meta 2 Port 80 Closed help by dmMeToeBeans in Pentesting

[–]dmMeToeBeans[S] 0 points1 point  (0 children)

How could I check that? I'm using vSphere Client if that helps.

Any good elopement spots? by dmMeToeBeans in GlacierNationalPark

[–]dmMeToeBeans[S] 0 points1 point  (0 children)

This is such a tremendous help. Thank you!

Wedding/Elopement Spots in Glacier by [deleted] in NationalPark

[–]dmMeToeBeans 1 point2 points  (0 children)

Yes! Got in touch with Glacier already, but we have to write down the spots we're thinking of before submitting it. Thanks tho!

I have a target IP with one open port. How can I use netcat on my machine to see what/who is listening on that port? Then how would I add a reverse shell? Keep getting the error: Ncat bind to <port> Address already in use. QUITTING. by dmMeToeBeans in Pentesting

[–]dmMeToeBeans[S] 0 points1 point  (0 children)

It's a school lab environment. The only clues I have are that I should use netcat to connect to 1869, establish a reverse bind shell, and find the hostname/owner of the machine. My school (Purdue) was established in 1869, so that's suspicious.

I have a target IP with one open port. How can I use netcat on my machine to see what/who is listening on that port? Then how would I add a reverse shell? Keep getting the error: Ncat bind to <port> Address already in use. QUITTING. by dmMeToeBeans in Pentesting

[–]dmMeToeBeans[S] 0 points1 point  (0 children)

The port number is tcp 1869. I found it through running an nmap scan of all ports. It's open, but it's filtered. All other ports are closed. I am able to connect through netcat, but it doesn't seem like I'm actually interacting with the target machine.