Nmap:
homepage
We know that cockpit is used. We have nothing else.
As a result of dbscan, the only thing that works for us is “/package.json”
There is a cockpit version.
It's also available on metasploit.
We found 4 usernames. If we set the username to skidy and run it again:
Don't forget to change the lhost value!
We cannot read the user.txt file, but we can read the .dbshell file. It contains the password of the stux user.
stux
sudo -l
i couldn’t manage to get shell using exiftool but i can read files with it as follow