PG Mice

I haven't seen these ports before. The agressive nmap scan doesn't give much information. I google the 1978 port.

Since the box is called "Mice" and the exploit is called "RemoteMouse", it tips me off. I look into the exploit and see the SIN 15WIN NOP NOP text. This must be it.

I edit the script and realize the issues are because this is python2. I run python2 expoit.py and it works. I download a faster exploit script too.

I try multiple reverse shells and fail. I throw my hands up and do the "Give Up! Download netcat and use that instead!" step. I get shell on the box.

Comments

Popular posts from this blog

Palo Alto for GNS3 CCDC Tutorial

Trace Labs Global Missing Persons CTF V

Release of CCDC ISE Manager Website