🐧Pwned1
192.168.234.95
Enumeration
Initial scan.
nmap 192.168.234.95 -p- -sV -A

Port 21
Banner Grab.

Port 22
Banner Grab.

Port 80
Note in source code.

Robots.txt

/hidden_text/secret.dic

Threw secret.dic into a word list and ran through dirbust. /pwne.vuln was found.

Found in source code. User : ftpuser Password : B0ss_Pr!ncesS

Back to Port 21
Was able to connect by user ftp with these credentials, grabbed an id_rsa and note.txt
Possible user name in note.txt

Shell
Using ariana and id_rsa was able to connect to the machine via ssh.

Interesting file

Sudo Perms

Another interesting file.

Had to look at a write up here. None of them worked so I ended up just entering sh sh into the file when it ran and got a shell with selena. I may have already had a shell from something I tried here but did not know due to not getting a bash prompt.
sudo -u selena ./messenger.sh

Stabilized shell.
python3 -c 'import pty;pty.spawn("/bin/bash")'
Uploaded Linpeas and read through the output not finding anything that stands out other than a few drives that seem to have been disconnected. After an hour I decided to get a hint.
Had to get a hint here. I had seen that docker was installed but was unaware of any priv. escs. with docker. What I thought were drives that had been disconnected were docker containers. Lesson learned.
Root

Last updated
Was this helpful?