Photographer: 1 Walkthrough
| reference | Photographer: 1 |
| target ip | 192.168.1.7 |
Scan with nmap:
smb-enum-shares:
There’re two files in sambashare:
mailsent.txt:
There’s a Koken hosted on http://192.168.1.7:8000, with an existed exploit (The author of the exploit and the box is the same one).
After a little bit guess work, I can login with username daisa@photographer.com and password babygirl to Koken.
Replace the original shell.php to a new one:
reverse shell:
/home/daisa/user.txt:
Privilege escalation is straightforward.
/usr/bin/php7.2 has setuid.
/root/root.txt:
- original shell1.php, 192.168.1.7 -> 192.168.56.106:443
- database.php