Bob 1.0.1
Bob 1.0.1
Enumeration
nmap
We see that there is only port 80 open and some disallow entries
Let's put it at the browser see what we got
Got this.
Exploitation
Then I navigate to /dev_shell.php
Got this shell, tried ping 192.168.1.113
and ; ping 102.168.1.113
and got this error
After a few tries, found out id can be used, so I went to try to set up a listener
Reverse Shell
At our machine, type
At the dev_shell
, type
Then we will receive a shell, from there, type
Then navigate to the /home directory and we will see 4 directory bob
, elliot
, jc
and seb
I first went to the elliot directory and saw a file called theadminisdumb.txt
After cat
the file
We can see that there is a password Qwerty
for a user, after su
to other 3 users, we know that the user is for jc
. The password theadminisdumb
is for elliot
.
su
into elliot
I can't find anything on those users, so I went to bob user to find any interesting, after looking around I navigate to /Documents
and saw 2 text files and a directory
Going inside the /Secret/Keep_out/Not_Porn/No_Lookie_In_Here
, there is a notes.sh
Cat
the file, after that the first character of each sentence is HARPOCRATES, it must be indicates a password
I went back tot he Document
directory
We can see there is a login.txt.gpg, use the string we got just now we might decrypt the file.
We can see that a credentials has been decrypted! and it is bob
credentials
Privilege Escalation
Lets su
into bob
type sudo -l
We can see it has sudo rights for this user
type sudo bash
and we will get root
type /flag.txt
and we will get the flag
Congratulation!
Last updated