NETWORK

ENUMERATION

The gobuster has reveal a wordpress instance

We have found a bot

We can run command (limited?)

Using our newly founded password

We get an initial shell as Dwight (Queenofblad3s!23)

FOOTHOLD

PRIV ESCALATION

Running the enumeration with

bash lse.sh -i -l1

We have found CVE-2021-4034

https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py

another version of the exploit

https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation


CAPTURE FLAGS


whoami; find / '(' -name 'local.txt' -or -name 'system.txt' -or -name 'user.txt' -or -name 'root.txt' -or -name 'proof.txt' -or -name 'access.txt' -or -name 'flag.txt' ')' -exec wc -c {} \; -exec cat {} \; 2>/dev/null; ip addr