Explore
Personal Rating: Easy
Enumeration
Starting with an nmap scan, some very interesting results can be seen:
http://10.10.10.247:59777/ #Forbidden: No dirlisting
ES File Explorer Exploit
The machine seems to be an Android device. Further investigating the ES File explorer turns out to be promising. I found an exploit script on exploitdb:
The shell was executed as 'u0_a76', but the image contained the credentials for the user kristi.
ADB Debug Shell
For the root I had some help from a friend who is more proficient in android hacking.
I started an ssh shell from my machine and used adb to start a debug shell:
The debug shell was running with root permissions.
This is unusual 'in the wild' as adb debugging would have to be activated on the device, which is uncommon and not default.
Last updated