Lazy Admin

Roomarrow-up-right Covers:

  • Service Discovery

  • Finding Vulnerabilities

  • Exploitation

  • Privilege Escalation

Target Details

  • IP: 10.10.209.190

Service Discovery

  • Using nmap

    nmap -sV -sC -Pn -oN nmap.txt 10.10.209.190
  • Services Discovered

    Service
    Port
    Version

    SSH

    22

    OpenSSH 7.2p2

    HTTP

    80

    Apache httpd 2.4.18

  • Finding Directories on HTTP server using GoBuster

    gobuster dir -u http://10.10.209.190/ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-small.txt -t 40 --no-error -o web-dirs.txt

    Directories Discovered: /content

  • On visiting /content page, the server's using Basic CMS with Sweet Rice installed

Finding Vulnerabilities

  • From 1st vulnerability, after visting /content/inc/mysql_backup/ link we get SQL database file, from where we get username and password hash, which can be easily cracked online using various tools such as crackstationarrow-up-right

    username
    password hash
    password

    manager

    42f749ade7f9e195bf475f37a44cafcb

    Passwordxxx

    we don't know login page yet!

  • Moving to parent directory /content/inc/, we get access to all the files , from where we get Sweet Rice version /content/inc/lastest.txt which is 1.5.1

  • On Searching for Sweet Rice 1.5.1 vulnerabilities on Search Engine, it leads to File Uploadarrow-up-right

  • On reading the exploit, we get the admin page link as /as but admin page is different which is /content/as

  • Visit /content/as with the admin credentials above

  • We can add custom php code from ADS tab

  • TL;DR;

    Service
    Vulnerability

Exploitation

  • Create an evil reverse shell adversitement

  • Using PentestMonkey php reverse shell templatearrow-up-right, we can get access to shell, by chaning ip variable to our attacker's vpn ip, and then upload

  • Start listener using netcat

  • From content/inc/ads/ we can execute the uploaded reverse shell

  • We have access to the shell

    We can run perl and /home/itguy/backup.pl as root

Privilege Escalation

  • Finding Escalation Vectors

    We can run perl and /home/itguy/backup.pl as root

  • Victim's shell

  • Root Shell on Attacker's machine

Get Flags

  • User Flag

  • Root Flag

Last updated