Skip to main content

README

Enumeration

  • Scan open ports
└─$ nmap -p- 192.168.136.10 -v -T5 | grep Disc
Discovered open port 22/tcp on 192.168.136.10
Discovered open port 80/tcp on 192.168.136.10
Discovered open port 9090/tcp on 192.168.136.10
  • Scan directories and files on port 80

  • Checking login.php

Vulnerability Discovery

  • Login page is vulnerable to SQL Injection

  • Checking the standard SQL Injection ' or 1=1 --

  • Got blocked

  • Tried hex entity encoding, didn't work took hint
  • Using below payload admin' -- -

  • Found usernames and base64 encodes passwords

┌──(kali㉿kali)-[~]
└─$ echo Y2FudHRvdWNoaGh0aGlzc0A0NTUxNTI= | base64 -d
canttouchhhthiss@455152
┌──(kali㉿kali)-[~]
└─$ echo dGhpc3NjYW50dGJldG91Y2hlZGRANDU1MTUy | base64 -d
thisscanttbetouchedd@455152

Lateral Movement

  • Checking website on port 9090

  • Using username and password to login

  • Trying to ssh using james credentials

  • Need to add public key

  • Creating public private key pairs

  • Adding the key to ubuntu instance

  • SSHing again with the key

  • Grab user's candy

Privilege Escalation

  • First enum for prev esc shows james can execute tar with sudo privilege.

  • Using this payload to escalate to root and stealing root's candy.