NETWORK
SCAN
ENUMERATION
While visiting the urls found in the scan step we can see the following
Looking into /election we can see
FOOTHOLD
SSH as Love
We have found a log file while examining the server
We have found the following credentials for user Love
love / P@$$w0rd@123
Using those credentials, we have access to the SSH of the user Love
PRIV ESCALATION
Abusing FileServer Serv-U
Looking on the open ports of the server (with linpeas.sh) we have found the following
something is clearly listening on the port 43958
after an ssh port forwarding, with the following command
ssh [email protected] -L 8001:127.0.0.1:43958
anything hosted on the server on the port 43958 was then accessible from our local machine via the port 8001.
We have found a serv-u file server version 15.1.6.25
searching for vulnerabilities we were able to found exploits
and settle for a local privilege exploitation script 47173.sh
which gave us a root session