Skip to content

This script was modified to run correctly in python 2 for the TryHackMe lesson called “Exploit Vulnerabilities”. The exercise where the script will be performed is : Task 5 Partical:Manual Exploitation

Notifications You must be signed in to change notification settings

Gh0xPwn/Correction-Online-Book-Store-1.0---Unauthenticated-Remote-Code-Execution-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Correction-Online-Book-Store-1.0---Unauthenticated-Remote-Code-Execution-(Try_Hack_Me:Exploit Vulnerabilities )

Script Exploit Modified

Title

This script was modified to run correctly in python 2 for the TryHackMe lesson called “Exploit Vulnerabilities”. The exercise where the script will be performed is : Task 5 Partical:Manual Exploitation

Task

Changes made

  • We replaced 2 lines of code where we use variable value entries. These Variables are needed for :
    • Login to the machine --> launch_shell(variable)
    • Use of sending commands inside the machine. ----> cmd (variable) image

Usage

Run the script with:

  python2 47887.py <ip-machine>

image

About

This script was modified to run correctly in python 2 for the TryHackMe lesson called “Exploit Vulnerabilities”. The exercise where the script will be performed is : Task 5 Partical:Manual Exploitation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages