File Info Gathering & Script Abuse
Last updated
Last updated
If it's a file we can't read like a binary file we might be able to still gather some info of how it works or maybe even credentials.
Examples
Kali
Examples
If a script is using libraries check if the paths can be abused. It may be possible to instead of importing the library to go to a script we create instead or modify the existing one if we have access to do so.
Check the script and which libraries it uses.
Check to see what takes precedence. For example in the screenshot below it says ' ' has the highest priority which means the current working directory.
Victim
Check if we have access to modify any of the libraries' that the script uses.
Victim
Kali