TUTORIAL tentacle DISCUSSION
by blurghadurgh - January 23, 2021 at 11:02 PM
#13
I am here to help. So you can post your question
#14
Tried using Metasploit on the Opensmtp server. Does anyone know if this is the right server to exploit?
#15
Use the perl script, you will need to modify it to get RCE.
#16
How can i find the internal IP ? I have tried a lot of things but nothing work so far.
#17
I'm struggling to get the reverse shell to create a session on my attack machine. Have RCE, but cannot seem to bypass the chain
#18
Use should use proxychains to run the exploit and get reverse shell but you have to try few languages
#19
Hello everyone.

I got a hash from kerber, but it's a rabbit hole. Got 7 ports with Wfuzz, got 1 subdomain with Gig, and found an authentication form from Squid pxoxy. How can I get a password or internal IP?
#20
I can see the internal subdomains however not able to find more details on this, pls gimme some nudge...
#21
Finally got user. That was a whirlwind tour
#22
(January 28, 2021 at 09:39 PM)p0z0x Wrote: Finally got user. That was a whirlwind tour

Great! Can you give us a hint?
#23
any nudge on accessing another ip's via proxychains? and smuggling?
#24
(January 28, 2021 at 10:41 PM)uschibhuels Wrote:
(January 28, 2021 at 09:39 PM)p0z0x Wrote: Finally got user. That was a whirlwind tour

Great! Can you give us a hint?

Once you get a shell on the smtp box, think about kerberos

Possibly Related Threads…
Thread Author Replies Views Last Post
TUTORIAL Unobtainium [DISCUSSION] L004 46 4,212 4 hours ago
Last Post: gambit1337
FLAG TENTACLE FREE WRITEUP RFADMIN 18 5,011 April 14, 2021 at 10:17 AM
Last Post: scriptkiddiecn
TUTORIAL PWN Restaurant DISCUSSION n3m3n91 15 2,100 April 13, 2021 at 05:03 AM
Last Post: Sweet_Froyo

 Users browsing this thread: 1 Guest(s)