ShadowNET Posted March 13, 2011 Share Posted March 13, 2011 We will be using NetCat. You will need a shell on a website. http://www.youtube.com/watch?v=woHQFsGY6Ys Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted March 18, 2011 Share Posted March 18, 2011 I liked the demonstration, you could've however used a different exploit for a different vulnerability and that would've resulted in a successful root. Anyway just my thought. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.