🐧DriftingBlues6

192.168.60.219

Enumeration

Nmap scan

nmap -sV -p- 192.168.60.219 -A 

Port 80

Dirbuster scan

Robots.txt

Spammer.zip is password protected. Extracting hashes.

zip2john spammer.zip > spammer.hashes

Bruteforcing with John

Found password for spammer.zip file : myspace4

Contents of creds.txt

mayer:lionheart

Logged in with the found credentials at http://192.168.60.219/textpattern/textpattern

Edited my reverse shell pointing toward my IP. Uploaded. Opened my file from http://192.168.60.219/textpattern/files/

Shell

Linpeas found that this machine is vulnerable to dirty cow https://github.com/firefart/dirtycow

Grabbed exploit and transferred to victim machine. Compiled exploit.

gcc 40616.c -o cowroot -pthread

It did give an error but compiled anyways.

Ran exploit ./cowroot

Root

Last updated

Was this helpful?