Agent T
AgentT room has a weird behaving admin dashboard which isn't operational. Attacker needs to find their way into the server!
Target Details
TARGET_IP : 10.10.71.24
HTTP service running on Port 80
Send Request to Target Machine
Send Get request
curl -X GET http://{TARGET_IP} --snip--returns webpage html content (basic template from the web)
Investigate headers
$ curl -I http://10.10.71.24 HTTP/1.1 200 OK Host: 10.10.71.24 Date: Sun, 27 Nov 2022 07:57:06 GMT Connection: close X-Powered-By: PHP/8.1.0-dev Content-type: text/html; charset=UTF-8Now we know that server is running PHP 8.1.0 dev on backend
Finding for PHP 8.1.0-dev exploits on the web, we get a RCE exploit from exploit-db
Running Exploit Script
Download Exploit
Execute Exploit
Now we can execute code remotely on the web server as root user
Get The FLAG!!
List directories
flat.txt is in
/dirRead Flag
Last updated
Was this helpful?