Dog
Easy - Linux

Enumeration
Ports
Websites

Classsic Virtual Hosting dog.htb
Possible Usernames: dogBackDropSystem && Anonymous

CMS with name Backdrop
Is available the login addres -->

Hack the WebApp
User Enumeration


With it we can see, that the user dogBackDropSystem is available. Okay, we now search some inforamtion about exploits of Backdrop CMS 1.27.1
Exploit Database

Nice! sooo, now download it and execute the script -->


WebShell
NICE! Now, create a revershell and we put the netcat of lisener on any port -->

I do me TTI treatment -->
script /dev/null -c bash Ctrl+z stty raw -echo; fg reset xterm export TERM=xterm export SHELL=bash stty rows 45 columns 184 ##dimensiones pantalla portatil
Into the web path we can see a archive with name settings.php, and inside it we can read a password:
First Climb


Now, i list the current user into this machine -->

And try to su in there are -->

Root Climb
With it, see the sudo permissions -->

We can see that this user will can bee of all permissions, so...
After investigate, i found a eval funtion with we can do a command execution -->



Last updated