This is another VM named as Billu_B0x. This is very easy to access and can get root access of the machine.
PENETRATION METHODOLOGY:
PENETRATION METHODOLOGY:
- NMAP
- DIRB
- CURL
- SSH
EXPLOITATION
First of all we need to run nmap to enumerate ports and services running on the server.
On enumerating target, we get ssh and http are running. On viewing HTTP over browser, we get the following page running.
Now trying to run 'dirb' on the web server using the big.txt dictionary.
On the scan we found phpmy page, we find phpmyadmin is running.
After that viewing the dirb scan, their is '/test', by visiting the directory we found that page.
This page shows that their is post parameter named 'file'. Now we are trying to curl this page using tool 'curl' to read the remote files by using LFI vulnerability.
First, we are trying to read the passwd file on the remote location.
And we are success to read the file. Now we are trying the configuration file of the phpmyadmin.
Success!! We are able to read the configuration file of the config.inc.php file of the phpmyadmin at '/var/www/phpmy/config.inc.php'.
We have the root password of the target machine. And now we are to login to the ssh with 'root' and password as 'roottoor'.
Success!! we are now in the root shell of the target machine.
Now, Challenge is completed!!
This challenge is completed by - M4TRIX_H4CK3R
Comments
Post a Comment