Funbox: 1 Walkthrough
reference | Funbox: 1 |
target ip | 192.168.1.8 |
Scan with nmap
:
Add the domain funbox.fritz.box
to /etc/hosts
, since curl
redirected from ip to domain:
http://funbox.fritz.box
hosts a wordpress, with the username admin
.
Brute force with wpscan
:
1 | wpscan --url http://funbox.fritz.box --no-banner -U admin -P /usr/share/wordlists/rockyou.txt |
Login into wordpress.
There’s another user:
Brute force with hydra
to FTP service:
1 | hydra -l joe -P /usr/share/seclists/Passwords/Common-Credentials/best1050.txt ftp://192.168.1.8 -e nsr -I -V |
This is also the SSH credential.
Rbash:
Escape from rbash:
There’s a cron-like script in /home/funny
:
Escalate to root
:
/root/flag.txt
:
/home/joe/mbox