Pwned: 1 Walkthrough
| reference | Pwned: 1 |
| target ip | 192.168.1.11 |
Scan with nmap:
Enumerate HTTP with gobuster:
Request http://192.168.1.11/hidden_text/secret.dic:
Check secret.dic line by line:
1 | while read line; do |
Request http://192.168.1.11/pwned.vuln/, which reveals ftp username and password:
Enumerate FTP:
note.txt:
Login into the system as user ariana via SSH:
/home/ariana/user1.txt:
Escalate from user ariana to user selena:
/home/messenger.sh:
Inject codes into variable msg:
/home/selena/user2.txt:
As shown in the screenshot, user selena is in group docker.
Escalate from user selena to user root.
This method is from chrisfosterelli/dockerrootplease.
Use any existed image.
1 | docker run -v /:/hostOS -it $image chroot /hostOS /bin/bash |
via image debian:wheezy:
via image alpine:latest:
via image privesc:latest:
/home/ariana/ariana-personal.diary:
/home/selena/selena-personal.diary:
- maybe it should be vanakkam instead of vanakam: