🐧DC-2 - unfinished

192.168.129.194

Enumeration

Nmap scan

nmap -sV -p- 192.168.129.194 -A

Port 80

Running dirb against the site because it fails to go to port 80 at this IP.

Interesting error.

Added IP to host file as dc-2

Made word list with cewl

Try to bruteforce the login for wp-login.php

Exploit

Document here:

  • Exploit used (link to exploit)

  • Explain how the exploit works against the service

  • Any modified code (and why you modified it)

  • Proof of exploit (screenshot of reverse shell with target IP address output)

Post-Exploit Enumeration

Current User

chevron-rightClick to expandhashtag

OS & Kernel

chevron-rightClick to expandhashtag

Users

chevron-rightClick to expandhashtag

Groups

chevron-rightClick to expandhashtag

Network

chevron-rightInterfaceshashtag
chevron-rightARP Tablehashtag
chevron-rightRouteshashtag
chevron-rightOpen Portshashtag
chevron-rightPing Sweephashtag

Processes

chevron-rightClick to expandhashtag

Services

chevron-rightClick to expandhashtag

Scheduled Tasks

chevron-rightClick to expandhashtag

Interesting Files

chevron-rightFile 1hashtag

\

Privilege Escalation

Document here:

  • Exploit used (link to exploit)

  • Explain how the exploit works

  • Any modified code (and why you modified it)

  • Proof of privilege escalation (screenshot showing ip address and privileged username)\

Persistence

Document here how you set up persistence on the target

Flags

chevron-rightUserhashtag
chevron-rightRoothashtag

Shell

Root

Template partially from 0xC0FFEE https://notes.benheater.com

Last updated