Panabee: 1 Walkthrough
| reference | Panabee: 1 |
| target ip | 192.168.1.10 |
use vmware instead of virtualbox for this box
Scan with nmap:
Scan with nmap ssh-auth-methods:
Enumerate Samba shares with enum4linux:
smbclient:
note.txt:
Enumerate Samba users with enum4linux:
Try to guess FTP password with hydra:
1 | hydra -L users -P /usr/share/seclists/Passwords/probable-v2-top207.txt 192.168.1.10 ftp -V -I -e nsr -t 4 -T 2 -u |
Login into FTP as user goper:
Download .bash_history:
.bash_history reveals a script called /home/goper/backup.sh:
Upload a reverse shell as /home/goper/backup.sh, and get a reverse shell:
Escalate from user goper to user jenny.
Hijack to a python reverse shell with /home/goper/platform.py:
Get a reverse shell as user jenny:
Escalate from user jenny to user root.
Enumerate existed processes, that reveals a tmux session with sharedsessions:
Attach to this session to escalate to user root:
1 | tmux -S /opt/.tmux-0/sockets/default |
/root/proof.txt:
http://panabee.my/Source:
/etc/apache2/sites-enabled/000-default.conf:
http://dev.panabee.my, which leads to FTP:
Actually I didn’t find this subdomain before I got the reverse shell as user goper.
I tried to use nmap http-vhosts, but failed:
1 | while read sub; do |