thanks! this was really confusing as i couldnt download linpeas. got a reverse shell easy with metasploit and the id_rsa but couldnt use wget. so much to learn. priv escalation is hard
This is based on experience. When something does not work, we try the other way. The original payload consisted of special characters which may not be properly sent to the remote server, therefore we base64 encode our payload to get rid of special chars and keep it simple alphabets.
@@TechMafia7 My man thanks for the response. I could not get any payload to work and thought I was just mucking it up. This has been incredibly informative.
AppArmor profile restricts us from writing to /opt directory but getting a reverse shell bypasses the profile settings for think user as the settings are different now as we're in a reverse shell. I'll provide more information on this on a separate video.
This is based on experience. When something does not work, we try the other way. The original payload consisted of special characters which may not be properly sent to the remote server, therefore we base64 encode our payload to get rid of special chars and keep it simple alphabets.
thanks! this was really confusing as i couldnt download linpeas. got a reverse shell easy with metasploit and the id_rsa but couldnt use wget. so much to learn. priv escalation is hard
@@bobbyrandomguy1489 Indeed, this room teaches a lot.
can you tell me why you had to encode this in base64 for it to work?
This is based on experience. When something does not work, we try the other way. The original payload consisted of special characters which may not be properly sent to the remote server, therefore we base64 encode our payload to get rid of special chars and keep it simple alphabets.
@@TechMafia7 My man thanks for the response. I could not get any payload to work and thought I was just mucking it up. This has been incredibly informative.
wonderful, thanks
You're welcome!
Can you explain how you get write permissions to /opt dir?
AppArmor profile restricts us from writing to /opt directory but getting a reverse shell bypasses the profile settings for think user as the settings are different now as we're in a reverse shell. I'll provide more information on this on a separate video.
@@TechMafia7 Thanks! :)
ruclips.net/video/iOdsbF05k7s/видео.html, at this point how you knew you have to base 64 encode, please explain
This is based on experience. When something does not work, we try the other way. The original payload consisted of special characters which may not be properly sent to the remote server, therefore we base64 encode our payload to get rid of special chars and keep it simple alphabets.
@@TechMafia7 thankyou so much i stuck whole day there😅
@@hiteshverma8728 No worries. Glad I was able to help.
@@TechMafia7Damnn.. you have a lot of experience can you pls tell us how to get job in this field
I don't have a job yet, haha.