Home
Machines
Tools
Nmap Output
Nikto Output
Dirb Output
We see that the "/content/as" page is the login page.
"/content" page:
Here we see that there is SweetRice on the site.
If we search for "searchsploit sweetrice":
When we search for this exploit on the Internet
When we go to the inc folder, we can see there it really is.
In fact, we could find it just by navigating through the files that came up in the dirb scan. :D nvm
Backup File
Password:
We log in to the /content/as page with the login information.
When we browse the site a little bit, we realize that we can write code in the Ads tab.
The machine accepts the .php extension
Reverseshell:
Shell:
Before executing the file, we listen to the port.
We run the file and get the shell.
First Flag:
Privilege Escalation:
When we run sudo -l, we find a file that we can run with root permission.
When we print the file with “cat”, we see that it runs the file /etc/copy.sh.
When we look inside the copy.sh file, we see a ready-made reverse shell code. (Lazy Admin…)
We edit the IP address and port, listen to the port from the host and run the code.
Of course, we run the code with the path we have permission.
sudo /usr/bin/perl /home/itguy/backup.pl
Root Flag: