Skip to content

Latest commit

 

History

History
39 lines (33 loc) · 1.45 KB

File metadata and controls

39 lines (33 loc) · 1.45 KB

How to start

  • Power on the exploit_dev_ubuntu_x64-16.0.4.7 system from vmfusion and check the IP address.
  • Update the ~/.ssh/config file if the IP address is changed.
  • ssh_exploit_dev to ssh the box
  • Check for the existing sessions
# check the list of existing sessions
tmux ls
    
# attach to a specific session
tmux a -t exploit_dev
    
# attach to the last session
tmux a 
  • If tmux session is not present then start a fresh
# start a new session
tmux new -s exploit_dev -n window_name
  • detach from the present tmux session (ctrl + q) + d and also exit from the ssh session
  • mosh to the remote tmux session - mosh_exploit_dev
  • Open Pycharm -> Remote Development -> SSH to access the remote repository using JetBrains Client
  • /home/asinha/.pyenv/versions/playbook/bin/python should be set as remote interpreter.
  • git is also set with verified commit therefore directly push the updated code to the github.

Sync the ubuntu exploit dev folder to macos

  • ubuntu ~/linux_exploit_dev_local/ folder needs to be synced with the macos ~/Dropbox/pentest/linux_exploit_dev folder.
  • run the following command from macos to download the updated files from ubuntu
rsync -avz asinha@192.168.0.84:/home/asinha/linux_exploit_dev_local/ ~/Dropbox/pentest/linux_exploit_dev
  • upload a file from mac to ubuntu via scp
scp aslr_v1_pie.i64 asinha@192.168.0.62:/home/asinha/linux_exploit_dev/core_concepts/aslr
- ```