Ganana: 1 Walkthrough
| reference | Ganana: 1 |
| target ip | 192.168.1.20 |
Scan with nmap:
Enumerate HTTP with gobuster:
http://192.168.1.20/tasks:
http://192.168.1.20/jarret.pcapng:
Load jarret.pcapng to wireshark.
File -> Export Objects -> HTTP..:
Follow -> HTTP Streams:
Login into WordPress http://192.168.1.20/secret, though jarretlee is not the admin.
Enumerate hidden posts:
Base64 encoded:
Login into PHPMyAdmin http://192.168.1.20/phpmyadmin.
Enumerate table wp_users:
Crack the existed hash or update a new hash:
Login into WordPress as user charleywalker, who is the admin.
The method is already covered in sunset: midnight Walkthrough.
Upload a malicious plugin:
You can also update the existed plugins.
Reverse shell:
Escalate from user daemon to user jarretlee:
/home/jarretlee/.backups:
Crack with john:
Escalate from user jarretlee to user jeevan:
The method is already covered in Pwned: 1 Walkthrough.
Escalate from user jeevan to user root:
/root/root.txt:
- FTP 6777
.Welcome/.Note.txt: