Preignition (Tier 0)

Description

  • Tier -> 0

  • Difficult -> Very Easy

  • OS -> Linux

  • Tags -> Custom Applications / Apache / Reconnaissance / Web Site Structure Discovery / Default Credentials

Write-up

  • With a little research, I started answering the first questions

Answer: dir busting


Answer: -sV


  • Then I continue doing an initial port scan of the machine using Nmap

nmap 10.129.218.32 -p- -Pn --min-rate 2500 -oN scan.txt

  • With this, I answered the next question

Answer: http


  • I also did an exhaustive scan of the ports we found to get information about the services running

nmap 10.129.218.32 -p80 -sVC -oN serv_scan.txt

  • With this and a little research, I answered the next questions

Answer: nginx 1.14.2


Answer: dir


Answer: -x php


  • As I found a port was running the HTTP protocol, I checked the content deployed via the web browser, where I just found a default page for the Nginx server


  • Checking the source code didn't give me any relevant information, so I tried to fuzz the URL of the site using gobuster, and with this I found there was an available route in the /admin.php direction

gobuster dir -u http://10.129.218.32/ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt -o fuzz.txt

  • With this and a little research, I answered the next questions

Answer: admin.php


Answer: 200


  • So I went to this site and found there was a login page, where I tried to log in using common credentials, and discovered that using the combination of username admin and password admin, I logged in successfully, seeing a message that gave me the root flag


  • With this, I got the root flag and pwned the machine

Answer: 6483bee07c1c1d57f14e5b0717503c73

Last updated