Clam AV
Last updated
Last updated
Found a website with binary code: Challenge accepted \
Checking snmp we can find running processes:
Now using this exploit for sendtmail and clamdv: https://github.com/0x1sac/ClamAV-Milter-Sendmail-0.91.2-Remote-Code-Execution/blob/main/exploit.c
Now we can use a different exploit to get a shell https://www.exploit-db.com/exploits/4761
Testing with ping we get receive packets:
Then connect to it: