Shocker (Easy)
Enumeration
Nmap
nmap -sC -sV -oA nmap/10.10.10.56 10.10.10.56Nmap scan report for 10.10.10.56
Host is up (0.11s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
2222/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 c4:f8:ad:e8:f8:04:77:de:cf:15:0d:63:0a:18:7e:49 (RSA)
| 256 22:8f:b1:97:bf:0f:17:08:fc:7e:2c:8f:e9:77:3a:48 (ECDSA)
|_ 256 e6:ac:27:a3:b5:a9:f1:12:3c:34:a5:5d:5b:eb:3d:e9 (ED25519)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Jul 2 12:30:09 2021 -- 1 IP address (1 host up) scanned in 22.73 secondsPort 80 is open, let's have a look

We can't find anything on this page, so lets directory brute force it
Dirbuster


We can see there is a file called user.sh

We can download it.

After some research, we can know that this vulnerability is called shell shock. Explanation can be found at pentesterlab.
Reverse Shell
Fire up our listener, and run this command, then we will get a shell.


Privilege Escalation

We can navigate to GTFObin to exploit it.


Rooted!
Last updated
Was this helpful?