DriftingBlues6
Last updated
Was this helpful?
Last updated
Was this helpful?
192.168.60.219
Nmap scan
Dirbuster scan
Robots.txt
Spammer.zip is password protected. Extracting hashes.
Bruteforcing with John
Found password for spammer.zip file : myspace4
Contents of creds.txt
Logged in with the found credentials at http://192.168.60.219/textpattern/textpattern
Grabbed exploit and transferred to victim machine. Compiled exploit.
It did give an error but compiled anyways.
Ran exploit ./cowroot
Edited my reverse shell pointing toward my IP. Uploaded. Opened my file from
Linpeas found that this machine is vulnerable to dirty cow