Nocturnal

Enumeration

Nmap

Web

Basic virtual hosting

We can create a new account and login to see an upload file camp -->

I can try to upload a image and the response of the web service is -->

So... I will go to download a randowm pdf and try to upload it

We can see it and the web site target here -->

Explotation

So... it get us a pdf, pdf injection?? maybe... but it is a easy machine... We can see a possible IDOR?

We can ffuf with commonds usersernames with intruder -->

I use two dicctionaies names.txt

We can do it enumeration with fuff to:

While, I tested some test names and pdfs and i can found it -->

So... maybe, the main extension use is .odt

Continue with the enumertaion users -->

Target to amanda and tobias user (but online are information into amanda) -->

amanda:arHkG7HAI68X8s1J

So... I can try to connect in ssh, or login into the web -->

NICE! We are amanda admin, go to the admin panel -->

We can download a backup use the admin passwd and download a zip with all files -->

Intro admin.php we can see it

The name that we input, the source html/url encode... and interprete with php. Maybe we can execute commands with for example it -->

NICE! We can try to read the /etc/passwd and execute command in this camp, so, try to get a revershell

JUM... now revershell -->

NOTHING... so.. we can do backups of others directories inside the service?

We can see into the register.php previously download of the backup, a internal db directory

After search.. I found a method base64 encode -->

Its is MD5 Hahes -->

tobias:slowmotionapocalypse

We can try to connect via SSH -->

User Flag

We can see here a internal 8080 website run, we can do ssh tunneling for view it -->

admin:slowmotionapocalypse

After a long enumeration, i can see this CVE -->

Root Flag

Download and Ejecute the script -->

Last updated