Shocker (Easy)

Enumeration

Nmap

nmap -sC -sV -oA nmap/10.10.10.56 10.10.10.56
Nmap scan report for 10.10.10.56
Host is up (0.11s latency).
Not shown: 998 closed ports
PORT     STATE SERVICE VERSION
80/tcp   open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
2222/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 c4:f8:ad:e8:f8:04:77:de:cf:15:0d:63:0a:18:7e:49 (RSA)
|   256 22:8f:b1:97:bf:0f:17:08:fc:7e:2c:8f:e9:77:3a:48 (ECDSA)
|_  256 e6:ac:27:a3:b5:a9:f1:12:3c:34:a5:5d:5b:eb:3d:e9 (ED25519)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Jul  2 12:30:09 2021 -- 1 IP address (1 host up) scanned in 22.73 seconds

Port 80 is open, let's have a look

We can't find anything on this page, so lets directory brute force it

Dirbuster

We can see there is a file called user.sh

We can download it.

After some research, we can know that this vulnerability is called shell shock. Explanation can be found at pentesterlab.

Reverse Shell

Fire up our listener, and run this command, then we will get a shell.

Privilege Escalation

We can navigate to GTFObin to exploit it.

Rooted!

Last updated

Was this helpful?