Blocky
Last updated
Was this helpful?
Last updated
Was this helpful?
Initial Foothold : Credential Leakage
Privilege Escalation : Sudo Rights
Start with port scanning
Done with full port scanning
Lets start with web enumeration because ftp doesn't allows anonymous access
Visit the webpage
After some review got that website is running on wordpress
Use wpscan for enumeration of wordpress
According to this scan wordpress 4.6 was running
We also got one username called Notch on the webpage
Start dirbuster scan for finding web directories
Its odd to find plugins directory on the main web page
Open the web directory
Got two jar files download them and start reviewing them
Extract the jar files and review the contents
After extraction got an interesting file BlockyCore.class
Use strings to observe the content of the file
Looks like we got some database credentials
Lets see where we can possibly use this credentials
phpmyadmin
wordpress login
SSH Login
We havent got much interesting information on phpmyadmin and wordpress
Lets use this creds on ssh login
With root user this creds havent worked
Give a try with notch username
Oh yeah !! Got ssh shell as notch user
Run sudo -l
User notch has full access with root privileges lets sudo user to root
Got root Access
That's all for this box
Good Bye :)