Paper (Easy)
Enumeration
nmap
We can see there are pot 80 and 443 open
There is nothing interesting here. After poking around for a while, I curl the page and found out we need to supply the domain name to the /etc/hosts
file.
After that, we can see that we will get an entirely new page that has been made by WordPress.
By reading one of the posts on the forum, we may see the replies at one of the posts that might hint us something
Found a post regarding reading unauthenticated/draft post of WordPress here.
There is a way to manipulate the URL to show unauthenticated posts by supplying the following variable.
Putting asc as the value for the order does not work, but desc does.
We are able to see the "hidden" post now.
If we look closely, we are able to find the secret registration of the chat system URL address.
After registering the account, we are able to access the chat system of the organization.
It says that we are able to interact with the bots named "recyclops" by supplying commands.
2 most interesting commands right here.
After playing with the bot for a bit, I am able to list the /etc/passwd
and /self/proc/environ
files that are able to help me to further the process of exploitation.
We can see the password for the bot is Queenofblad3s!23, then we proceed to login as dwight as he is the developer of this bot.
User
Privilege Escalation
Use LinPeas to scan for vulnerability!
It shows it is vulnerable to CVE-2021-35601
Clone the repository and run it on the victim machine!
Got root!
Last updated