rustscan
Gobuster
gobuster dir -u http://10.10.219.98 -x txt,html,php -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
Not interesting.
Robots.txt
It’s the login page of the CMS
The config file is here:
User password of the login page
So if I user admin:admin in the login page it’s working.
Useless, let’s searsh for an exploit.
revershell
https://github.com/AssassinUKG/fuleCMS
Upgrade my shell:
python -c 'import pty; pty.spawn("/bin/bash")'
Enum with linpeas
My computer:
Target:
Then run it.
chmod +x l*
./l*
Linpeas is maybe overkill for this box, lse.sh is good for this kind of box.
CVE
Can be root in a sec with this exploit.
Password in config file
Let’s try it on root
The CTF is over.