Agent T
Last updated
Was this helpful?
Last updated
Was this helpful?
AgentT room has a weird behaving admin dashboard which isn't operational. Attacker needs to find their way into the server!
TARGET_IP : 10.10.71.24
HTTP service running on Port 80
Send Get request
returns webpage html content (basic template from the web)
Investigate headers
Now we know that server is running PHP 8.1.0 dev on backend
Finding for PHP 8.1.0-dev exploits on the web, we get a RCE exploit from
Download Exploit
Execute Exploit
Now we can execute code remotely on the web server as root user
List directories
flat.txt is in
/
dir
Read Flag