Ignite

Date: 12, June, 2021

Author: Dhilip Sanjay S


Click Herearrow-up-right to go to the TryHackMe room.

Enumeration

Nmap

$ nmap 10.10.162.181
Starting Nmap 7.91 ( https://nmap.org ) at 2021-06-12 14:12 IST
Nmap scan report for 10.10.162.181
Host is up (0.16s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
80/tcp open  http

Nmap done: 1 IP address (1 host up) scanned in 9.86 seconds

Fuel CMS

Fuel CMS

Initial Access

Searchsploit

  • Use searchsploit to look for Fuel CMS vulnerabilities.

  • We have RCE in the specified version

Reverse Shell

  • Download the RCE exploit 47138.py

  • Make few modifications as needed. Modified code:

  • Run the exploit and gain a reverse shell:

  • Reverse shell on attacker machine:

User.txt

  • Go to the home folder of www-data to get the user flag:


Root.txt

Check SUID binaries

  • I checked the wall and expiry binary. But I couldn't find anything to exploit!

Locating the Password

  • Use grep command to look for password inside the file system.

  • Options:

    • P - perl-regex engine

    • r - recursive search

    • z - treat the file as one huge string.

    • o - Print only the matching portion

Privilege Escalation

  • Use the credentials found to switch to root user:


Last updated