May 17, 2024, 2:38 p.m. | OffSec

OffSec www.youtube.com

Welcome to our walkthrough of Hetemit, a PG Practice machine: https://portal.offsec.com/labs/practice

In this clip, we:
🟪 Demonstrated executing a reverse shell on port 80 using NC and bin Bash, successfully establishing a connection.
🟪 Discussed the need for a proper PTY shell and proceeded to use Python 3 to enhance the shell functionality.
🟪 Shifted to privilege escalation, suggesting the need to enumerate the machine after exploitation.
🟪 Examined an API script that ran Flask, identifying functions that handled GET …

api bash connection escalation exploitation machine port privilege privilege escalation python python 3 reverse reverse shell shell

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC