Included
Personal Rating: Easy
Last updated
Personal Rating: Easy
Last updated
Running an initial nmap scan:
sudo nmap <IP>
I quickly found an LFI approach
So the first user seems to be 'mike'.
Since we have the tftp user and the port 69 open, I searched for the tftp default folder, which is /var/lib/tftpboot
.
I tried some command executions using php wrappers with the LFI, but that didn't work.
I found mike's credentials in the file '.htaccess'.
Through the LFI I also found out that the user is a member of the lxd group, which opens up this privilege escalation path:
But first I have to get a shell. I uploaded a webshell using the tftp share:
I fetched the shell an upgraded it to a fully interactive one:
I then used the tftp port to transfer an alpine linux container on to the host to exploit the lxd group.