Forum Discussion

Octavio's avatar
Octavio
Icon for Bronze I rankBronze I
15 days ago

Threat Research: Dependency Confusion Lab

Hello Community, 

I am almost finished Threat Research: Dependency Confusion Lab, but I am stuck with the last question "What is the token found in /root/token.txt on the target server?".

I have followed all instructions, setup listener, up to python reverse shell (setup.py) but at the end, I don't know how to access token.txt file.

Any help would be appreciated. Below are the screenshots from terminal listener and terminal where all commands are executed.

Thanks so much

Octavio

2 Replies

    • MaxCucchi's avatar
      MaxCucchi
      Icon for Community Support rankCommunity Support

      Hi Octavio​ 👋 thank you for sharing this in the community!

      Thank you for providing all of the screenshots showing your work. In this case, it does appear that the command you are running to read the token is correct. However, the directory you are running this command in is incorrect, which is likely the cause of the issue!

      To resolve this, I might recommend opening another terminal window or running the command in the same window where you started the netcat listener, as this will ensure the command is being run from the desktop.

      I hope this helps out in overcoming this particular challenge 😊