BBSCute
Last updated
Was this helpful?
Last updated
Was this helpful?
192.168.105.128
Nmap scan
Dirbuster found lots of directories. Got the service and version number. This specific version does have RCE exploits available.
Had the server connect back to me as the previous shell was just a webshell.
Sudo perms.
Using hping3 puts you in hping3 at a prompt then use /bin/sh -p and bamm you're root.
Using the exploit from and creating a normal using account I was able to get a shell. Had to find the captcha.php to get the account registered.
This was a little hard to get right for escalation using