
nmap shows 3 open ports: ssh, bind dns service and Apache http Default page







I copied request data from Burp to file: “request” and I used sqlmap to check for sql injection:

user and password send to login request:
admin’ or ‘1’=’1
‘ or ‘1’=’1
This allowed me to get authenticated

“Logged” user has access to this page:


It looks like utilizing linux ping binary. Maybe I can try escape from it

I received and netcat from machine



I tried simple TCP reverse shell

Netcat OpenBsd

linpeas.sh has shown potential way of privilege escalation




I read the documentation about laravel scheduling function and added schedule to Kernel.php:


I got the shell as a root, but it instantly dropped. This method is sensless, due to fact I have shell. I decided to add sticky bit to /bin/bash

