Photographer: 1 Walkthrough

reference Photographer: 1
target ip 192.168.1.7

Scan with nmap:

smb-enum-shares:

There’re two files in sambashare:

mailsent.txt:

There’s a Koken hosted on http://192.168.1.7:8000, with an existed exploit (The author of the exploit and the box is the same one).

After a little bit guess work, I can login with username daisa@photographer.com and password babygirl to Koken.

Replace the original shell.php to a new one:

reverse shell:

/home/daisa/user.txt:

Privilege escalation is straightforward.

/usr/bin/php7.2 has setuid.

/root/root.txt:


  • original shell1.php, 192.168.1.7 -> 192.168.56.106:443
  • database.php