Today we'll start here:
Not much indeed. So I started from the beginning;) Nikto, dirb&go-busters ;) then I started crawling more and more resources and I found 'some kind of a elearning platform':
This was something new for me so I started poking around with the app, searching what I can do as unauthenticated user and so on... and that's how I found:
(There are more bugs like this so I decided to find few more.) We will start here:
Little confirmation:
Part of DB-dump:
TL;DR:
In the meantime I was googling for the name of the webapp. I found that it's pretty exploitable ;)
Looks good. What about an admin?
Even better! ;) So this is where I started looking for potential upload form to drop a webshell. Let's see what an admin can do:
Ups... lack of filtering for 'server settings' (again ;D)...
Anyway, playing with the app I found that 'created course' will be stored in the (indexed) directory:
So I started my super uploads (everywhere I was able to do ;)):
Just checking... ;)
Next nice place I was curious about:
Now we should be here (case for uploaded oneliner):
So far, so good. So I grabbed the flag from /home directory:
Next - on my Kali VM - I prepared revshell again. This time I used python -m SimpleHTTPServer to download it to remote host:
That's how I was able to create a more stable ('reversed') connection:
To run - just visit your uploaded file in the course-directory:
Little recon ;]
I think the best enum-hint from this box comes from uname ;]
Few last notes - the flag.txt:
I think we can finish this post here. ;]
Special thanks goes to my Patreon: Daniel.
You are AWESOME!
See you next time! ;)
Cheers
Brak komentarzy:
Prześlij komentarz