FunBoxEasy
Last updated
Was this helpful?
Last updated
Was this helpful?
192.168.234.111
Nmap Scan
Banner grab
From the Nmap scan you can already see that robots.txt contains gym.
Dirbuster finds a lot of directorys at this IP.
Found a login page for /store/admin.php, takes admin:admin credentials. \
Found /store/database/www_project.sql. Cracking this hash just tells you the password is admin, which is already known.
Found that I could upload an image for the book. Uploaded php reverse shell.
Found file /home/tony/password.txt
Connected via SSH.
Sudo -l
Payload works for /admin login.
Ran reverse shell through
Using