Pwned1
Last updated
Was this helpful?
Last updated
Was this helpful?
192.168.234.95
Initial scan.
Banner Grab.
Banner Grab.
Note in source code.
Robots.txt
/hidden_text/secret.dic
Threw secret.dic into a word list and ran through dirbust. /pwne.vuln was found.
Found in source code. User : ftpuser Password : B0ss_Pr!ncesS
Was able to connect by user ftp with these credentials, grabbed an id_rsa and note.txt
Possible user name in note.txt
Using ariana and id_rsa was able to connect to the machine via ssh.
Interesting file
Sudo Perms
Another interesting file.
Had to look at a write up here. None of them worked so I ended up just entering sh sh into the file when it ran and got a shell with selena. I may have already had a shell from something I tried here but did not know due to not getting a bash prompt.
Stabilized shell.
Uploaded Linpeas and read through the output not finding anything that stands out other than a few drives that seem to have been disconnected. After an hour I decided to get a hint.
Had to get a hint here. I had seen that docker was installed but was unaware of any priv. escs. with docker. What I thought were drives that had been disconnected were docker containers. Lesson learned.