Reading Time: 2 min read
Start 20:24 07-05-2025
Scope:192.168.184.16
sudo nmap -sC -sV extplorer -sT -T5 --min-rate=5000 -Pn -vvvv -p-
PORT STATE SERVICE REASON VERSION22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)80/tcp open http syn-ack Apache httpd 2.4.41 ((Ubuntu))| http-methods:|_ Supported Methods: GET HEAD POST OPTIONS|_http-server-header: Apache/2.4.41 (Ubuntu)Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
80/TCP - HTTP
Section titled “80/TCP - HTTP”I head on over and get routed to the following URL right away.
Not too sure whether this is supposed to be exposed…or whether we can exploit it 🤔
I looked it up and found a juicy Bug Bounty WriteUp about this exact topic, let’s see if we can follow along:
This walkthrough was a bust as I was not able to create a sql
account on the linked website, neither did simple testing pass this page:
So instead I launched feroxbuster
and started enumerating.
Feroxbuster
Section titled “Feroxbuster”I tried out this endpoint instead:
Cool we get a login page!
Nice, simple admin - admin
, let’s try it out.
We get in and I notice 2 users:
I went ahead and changed dora to Admin status as well, who knows if anything good will come from it.
Let’s try to find some sort of exploit:
I was able to upload a webshell
EZ PZ
Foothold
Section titled “Foothold”Shell as www-data
Section titled “Shell as www-data”From here I just had to send myself a reverse shell:
I used the upload
feature on penelope to upload linpeas.sh
and other stuff to enhance my exploitation:
I found that dora is part of the disk group.
This file looks rather interesting?
I went on and viewed it via the website just because I still had access:
Turns out there’s a hash hidden in here.
Hash cracking time
Section titled “Hash cracking time”Let’s crack this shit:
EZ PZ
Shell as dora
Section titled “Shell as dora”local.txt
Section titled “local.txt”Privilege Escalation
Section titled “Privilege Escalation”Exploiting disk group privs
Section titled “Exploiting disk group privs”From my enum I had already found that dora is part of the disk group, let’s find out how we can exploit this.
I found a handy guide for this:
proof.txt
Section titled “proof.txt”Following this principle I got proof.txt
super easily:
But seeing as we actually need root access to pass the exam we will have to escalate privileges somehow.
Post-Exploitation
Section titled “Post-Exploitation”The actual intended route to getting root is as follows:
We get the root hash, time to crack it and escalate privs.
Finished 21:15 07-05-2025