Vaccine
Personal Rating: Very Easy
Enumeration
After a first nmap scan, those ports seem open:
sudo nmap -sV <IP>
Hash Cracking
With anonymous ftp login I could obtain the file backup.zip. It was encrypted and I bruteforced the password using john:
Checking the files inside, the PHP file contained the following:
I cracked the hash, it resulted to qwerty789
I logged in with those credentials at the webpage.
Automated SQLi
On the page there was a search field. I tried several injection types, but my tests didn't yield results. But an sqlmap scan did:
With sqlmap I could directly get an os shell.
GTFOBin vi
Searching for GTFObins yielded a quick result:
I executed the command with sudo to open the file with vi as root. vi can execute commands when opened, so I did just that:
With that a root shell was started.
Last updated