
NETWORK



ENUMERATION

The gobuster has reveal a wordpress instance










We have found a bot

We can run command (limited?)




Using our newly founded password
We get an initial shell as Dwight (Queenofblad3s!23)

FOOTHOLD
PRIV ESCALATION
Running the enumeration with
bash lse.sh -i -l1

We have found CVE-2021-4034
https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py
another version of the exploit
https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation


CAPTURE FLAGS
whoami; find / '(' -name 'local.txt' -or -name 'system.txt' -or -name 'user.txt' -or -name 'root.txt' -or -name 'proof.txt' -or -name 'access.txt' -or -name 'flag.txt' ')' -exec wc -c {} \; -exec cat {} \; 2>/dev/null; ip addr