Skip to content

Latest commit

 

History

History
115 lines (57 loc) · 2.2 KB

2019-09-symfonos.md

File metadata and controls

115 lines (57 loc) · 2.2 KB

Netdiscover

netdiscover

We use the tools called netdiscover scan hosts, we found the 192.168.111.140 is our target virtualbox host ip.


Namp

nmap

We found some services ssh, smtp, http, smb


Solution

index

enumlinux

We Found a anonymous directory, by connecting from smbclient.

smb

attention

We uploads attention.txt and found some possible passwords.

hailos

So we login in helios with password qwerty.smb2

Found /h3l105 directory, so we add /etc/hosts with symfonos.local

hello

We found a wordpress website, So we use wpscan to do it.

user

admin found

wpscan1

wpscan2

LFI found. We use Unauthenticated LFI

wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd

Successfully!!

LFI

We known that exists a mail server, so we cat this user mail.

mail

So We use php log poision attack.

mail_poision

poc0

We can execute ls -al command, so we nc to reverse shell.

poc

shell

Now we are reverse shell successfully!!, let's find those which owns suid permission file.

find

We found /opt/statuscheck, check his type , return.resp

This is http header, we guess may something important in executeable file.

type

rev

So we execute

echo '/bin/sh' > curl

chmod 777 curl

mkdir /tmp

mv curl /tmp

export PATH=/tmp:$PATH

/opt/statuscheck

root

now we'are root., So let's get the flag.

flag

Successfully!!!


That' all , Thanks for your watching