Wpawn
Last updated
Was this helpful?
Last updated
Was this helpful?
192.168.84.123
Banner grab
Running dirbuster to enumerate the website.
Found an interesting plugin being used.
Was able to get a reverse shell using the following.
Creating text file payload.txt and pulling it with Remote File Inclusion.
Got a shell.
Found no interesting files. There is another user named takis. Dropped Linpeas in /tmp
Found credentials.
The found password works for takis' account, connected via ssh.
Running sudo -l
Ran sudo su
There are known vulnerabilities for this plugin. \