Nocturnal

Enumeration
Nmap
Web

Basic virtual hosting

We can create a new account and login to see an upload file camp -->

I can try to upload a image and the response of the web service is -->

So... I will go to download a randowm pdf and try to upload it

We can see it and the web site target here -->


Explotation
So... it get us a pdf, pdf injection?? maybe... but it is a easy machine... We can see a possible IDOR?

We can ffuf with commonds usersernames with intruder -->
I use two dicctionaies names.txt

We can do it enumeration with fuff to:
While, I tested some test names and pdfs and i can found it -->

So... maybe, the main extension use is .odt
Continue with the enumertaion users -->

Target to amanda and tobias user (but online are information into amanda) -->


amanda:arHkG7HAI68X8s1J
So... I can try to connect in ssh, or login into the web -->

NICE! We are amanda admin, go to the admin panel -->

We can download a backup use the admin passwd and download a zip with all files -->

Intro admin.php we can see it

The name that we input, the source html/url encode... and interprete with php. Maybe we can execute commands with for example it -->

NICE! We can try to read the /etc/passwd and execute command in this camp, so, try to get a revershell

JUM... now revershell -->

NOTHING... so.. we can do backups of others directories inside the service?
We can see into the register.php previously download of the backup, a internal db directory

After search.. I found a method base64 encode -->


Its is MD5 Hahes -->

tobias:slowmotionapocalypse
We can try to connect via SSH -->
User Flag



We can see here a internal 8080 website run, we can do ssh tunneling for view it -->

admin:slowmotionapocalypse


After a long enumeration, i can see this CVE -->
Root Flag
Download and Ejecute the script -->

Last updated