data-exfiltration
SOLUTION
ip -br -c a
ping demo.ine.localroot@INE:~# ip -br -c a
eth1@if126466 UP 192.70.33.2/24
lo UNKNOWN 127.0.0.1/8
ip_vti0@NONE DOWN
eth0@if126463 UP 10.1.0.17/16
root@INE:~# ping demo.ine.local
PING demo.ine.local (192.70.33.3) 56(84) bytes of data.
64 bytes from demo.ine.local (192.70.33.3): icmp_seq=1 ttl=64 time=0.159 msnmap

Web shell commands



Python HTTP server




Last updated