
NETWORK

ENUMERATION
Shares


The shares contains a zip which itself has a sqlite database file

We can use sqlitebrowser to review this db.sqlite3 database

We have found some credential on the database
sqlitebrowser db.sqlite3


pbkdf2_sha256$150000$BRmG62oZafLr$26JTvcu7JzJOFWV2FJVprunYodxwEbchAKOkF1PKfuI=
hashcat -m 10000 admin.hash /usr/share/wordlists/rockyou.txt

PRTG Network
On the port 80, we have PRTG Network web interface

The default credentials which are prtgadmin:prtgadmin doesn’t work. The credentials prtgadmin/Se7vmMqP0al gave us access to the admin area of PRTG software

FOOTHOLD
https://github.com/A1vinSmith/CVE-2018-9276
Running the exploit gives us an access on the server as the system user
