Skip to content

Pluck 1

by ssanjua

September 21, 2024 | 05:00 PM
Share this post:

About Release

Recognition

After turning on the victim machine and our Kali, we try to recognize the IP of our target with arp-scan.

sudo arp-scan -I eth0 --localnet --ignoredups

We see in the output that the victim machine is on and that we are in front of a Linux system since the ttl is 64, corresponding to Linux operating systems.

Now we do a scan with nmap to see what services the victim machine is running.

nmap -p- --open -sSV -n -Pn 192.168.128.137

Descripción

Port 80 OPEN, lets check the website:

Descripción

we see in the url the ?page=php points to different php files we play with wrappers and we see that it is vulnerable and we see commands

Descripción Descripción

when we see the passwd we see the backup user and look at the bash script

we try to get via tfcp the backup.tar

Descripción

we unzip and see the paul public and private keys and ssh

Descripción

we see the private and public keys and try to login as paul via ssh

the private key should not ask for a password, so we find that 4 does not ask for it.

we see that paul is assigned this pdmenu

Descripción

we see that edit gives us the ability to run a vim and we look in gfibins for how to exploit the vi and we find :set shell=/bin/bash :shell we execute and we are inside as paul

Descripción

we look for scaling our privilege now we search in searsploit looking for the 4000 binary exploit

Descripción Descripción

search for exim

we download the privilege escalation exploit

Description

we execute it and chan

Descripción