Daily Bugle
Tasks:
- Deploy:
- Deploy machine visit ip address in browser and submit the answer.
- Perform nmap scan with
nmap -sC -A -T5 ip - website is using joomla
- Obtain user and root:
- use msfconsole auxilary script to detect joomla version - 3.7.0
- Use searchsploit for joomla version - vulnerable to SQLi
- Use this public exploit for the CVE - got username,password hash for joomla database.
- Hash is bcrypt , crack it with john and rockyou.txt wordlist - spiderman123
- login to http://ip/administrator with username and password and upload shell in default templates index.php and get reverse shell.
cat var/www/html/configuration.php , it contains lot of sensitive information, copy the password. cd /home and ls , there is user called jjameson, login as that user with password obtained.
cat /home/jjameson/user.txt and submit user flag.
sudo -l says we can run yum as sudo, search yum exploit in GTFOBins and proceed to obtain root priviledge.
cat /root/root.txt and submit root flag !!!
- Credits:
- Just click completed