Exploitation
Last updated
Last updated
According to our scans Bratarina is running OpenSMTPD 2.0 which makes this machine a good candidate for the RCE.
In order to get the exploit to work we had to use the principle of using the same thing, just in different ways.
I ran the following command to get a reverse shell.
I also found this exploit from github which seems to be really good as well.