Included
Personal Rating: Easy
Enumeration
Running an initial nmap scan:
sudo nmap <IP>
80/tcp open http
68/udp open|filtered dhcpc
69/udp open|filtered tftpPHP Path Traversal
I quickly found an LFI approach
So the first user seems to be 'mike'.
Since we have the tftp user and the port 69 open, I searched for the tftp default folder, which is /var/lib/tftpboot.
I tried some command executions using php wrappers with the LFI, but that didn't work.
Initial Access
I found mike's credentials in the file '.htaccess'.
Through the LFI I also found out that the user is a member of the lxd group, which opens up this privilege escalation path:
But first I have to get a shell. I uploaded a webshell using the tftp share:
I fetched the shell an upgraded it to a fully interactive one:
LXD Group Abuse to root
I then used the tftp port to transfer an alpine linux container on to the host to exploit the lxd group.
Last updated