nmap shows 3 open ports: ssh, bind dns service and Apache http Default page

I copied request data from Burp to file: “request” and I used sqlmap to check for sql injection:

user and password send to login request:

admin’ or ‘1’=’1

‘ or ‘1’=’1

This allowed me to get authenticated

“Logged” user has access to this page:

It looks like utilizing linux ping binary. Maybe I can try escape from it

I received and netcat from machine

So It is vulnerable

I tried simple TCP reverse shell

it didn’t work

Netcat OpenBsd

It did work

linpeas.sh has shown potential way of privilege escalation

I read the documentation about laravel scheduling function and added schedule to Kernel.php:

I got the shell as a root, but it instantly dropped. This method is sensless, due to fact I have shell. I decided to add sticky bit to /bin/bash

By Marceli

Leave a Reply

Your email address will not be published. Required fields are marked *