🐧FunBoxEasy
192.168.234.111
Initial Scan
Nmap Scan
nmap 192.168.234.111 -sV -A -Pn

Port 22
Banner grab

Port 80
From the Nmap scan you can already see that robots.txt contains gym.



Dirbuster finds a lot of directorys at this IP.
Found a login page for /store/admin.php, takes admin:admin credentials. \

Found /store/database/www_project.sql. Cracking this hash just tells you the password is admin, which is already known.

Payload works for /admin login. https://www.exploit-db.com/exploits/48940
jyot' or 1=1#

Shell
Found that I could upload an image for the book. Uploaded php reverse shell.

Ran reverse shell through http://192.168.234.111/store/bootstrap/img/rev3.php

Found file /home/tony/password.txt

Connected via SSH.

Sudo -l

Root
Using https://gtfobins.github.io/gtfobins/pkexec/
sudo pkexec /bin/sh

Last updated
Was this helpful?