Forum Discussion
JWhit101
Bronze II
2 months agoWeb App Hacking (Lab series): CVE-2022-42889 (Text4Shell) – Offensive
Hey all, Anyone have any luck with CVE-2022-42889 (Text4Shell) – Offensive? The first few questions were easy enough, but I have spent hours on the last one trying to get the token. On the attack...
- 28 days ago
I was also now able to complete this lab using a browser, or using curl in a terminal, both work just as well.
By combining the Payload Example in the briefing and the reverse shell command in the referenced blog, I created the new payload. I think the key that prevented success for a long time, was that when using CyberChef to URL encode it, you MUST encode all special characters!
Good luck!
J
xchenoh
Bronze I
2 months agoI'm experiencing the exact same problem! I've been working on this lab for hours and have tried everything. Despite getting the "Processed: <PAYLOAD>" response each time, I was never able to retrieve token content from /token.txt
This seems like a systemic issue with the lab environment. Has anyone actually successfully completed this lab recently?