Agent T
AgentT room has a weird behaving admin dashboard which isn't operational. Attacker needs to find their way into the server!
Target Details
TARGET_IP : 10.10.71.24
HTTP service running on Port 80
Send Request to Target Machine
Send Get request
returns webpage html content (basic template from the web)
Investigate headers
Now we know that server is running PHP 8.1.0 dev on backend
Finding for PHP 8.1.0-dev exploits on the web, we get a RCE exploit from exploit-db
Running Exploit Script
Download Exploit
Execute Exploit
Now we can execute code remotely on the web server as root user
Get The FLAG!!
List directories
flat.txt is in
/
dirRead Flag
Last updated