
NETWORK

ENUMERATION
Web


Scans

FOOTHOLD
Let’s go after the /admin space

FTP anonymous
We have anonymous FTP access to the server.

The index.php.bak has some interesting information

It seemed that strcmp has some issues when comparing a string to something else.
Searching for an exploit for this function, we have found that if we send an empty array for the content of our variables, then strcmp would return a NULL. Due to some inherent weaknesses in PHP’s comparisons, NULL == 0 will return true (more info).
We went on to craft the following command
curl http://192.168.74.101/admin/index.php\?login\=1 -X POST -d 'username[1]=&password[2]='
Which gave us access to the platform




Using the log loading system

we managed to retrieve important data on the server


Let’s crack the password we have found
john hash.txt /opt/rockyou/rockyou.txt

PRIV ESCALATION
Using the password we cracked in the the previous phase we are able to get access to the server

Looking into the sudo permissions we can see the user can run the command /bin/nice

Looking into gtfobin we have found a way to exploit the vulnerability

