HTB-swagshop
Documentation for the Swagshop box
How to execute the script
- Edit the
reverse_shell.php.jpg
file to include your own ip (ifconfig
) and a nice port (eg.10365
) - Make sure the three files (
37977.py
,reverse_shell.php.jpg
andautomated-exploit.py
) are in the same folder - Run
python automated-exploit.py
- Open another terminal and run
nc -v -n -l -p [your_port]
(eg.nc -v -n -l -p 10365
) - When the script asks, make sure netcat is listening, and press enter
- The script should hang, and the netcat should have a shell
Can I run this multiple times?
Yes.
How does it work?
By using a flute to tame the python.