Pwned: 1 Walkthrough
reference | Pwned: 1 |
target ip | 192.168.1.11 |
Scan with nmap
:
Enumerate HTTP with gobuster
:
Request http://192.168.1.11/hidden_text/secret.dic
:
Check secret.dic
line by line:
1 | while read line; do |
Request http://192.168.1.11/pwned.vuln/
, which reveals ftp username and password:
Enumerate FTP:
note.txt
:
Login into the system as user ariana via SSH:
/home/ariana/user1.txt
:
Escalate from user ariana to user selena:
/home/messenger.sh
:
Inject codes into variable msg:
/home/selena/user2.txt
:
As shown in the screenshot, user selena is in group docker.
Escalate from user selena to user root.
This method is from chrisfosterelli/dockerrootplease.
Use any existed image.
1 | docker run -v /:/hostOS -it $image chroot /hostOS /bin/bash |
via image debian:wheezy:
via image alpine:latest:
via image privesc:latest:
/home/ariana/ariana-personal.diary
:
/home/selena/selena-personal.diary
:
- maybe it should be vanakkam instead of vanakam: