FunboxEasyEnum - Easy

Nmap Scan

┌─[sheinn101@parrot]─[~/offsec/FunboxEasyEnum]
└──╼ [??]$ sudo nmap -sC -sV -oN nmap.out 192.168.129.132
Starting Nmap 7.92 ( https://nmap.org ) at 2021-11-06 22:37 +0630
Nmap scan report for 192.168.129.132
Host is up (0.27s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 9c:52:32:5b:8b:f6:38:c7:7f:a1:b7:04:85:49:54:f3 (RSA)
|   256 d6:13:56:06:15:36:24:ad:65:5e:7a:a1:8c:e5:64:f4 (ECDSA)
|_  256 1b:a9:f3:5a:d0:51:83:18:3a:23:dd:c4:a9:be:59:f0 (ED25519)
80/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 39.57 seconds

Directory Scan

In robots.txt

In mini.php , we get a shell to upload files.

Uploading Reverse Shell

In Linux php-reverse-shell.php is already builtin, so you can find with this command

locate php-reverse-shell.php

You can also upload with curl command

When we uploaded shell, listen with nc and visit the url or run curl command

From /etc/passwd ,we got a user which is called goat

As a easy box, we should brute force ssh that username with hydra

SSH Bruteforcing with Hydra

Now we got goat password and switch to that user.

Privilege Escalaption

Always try sudo -l first and we see mysql can run as root without password.

Type this command to get shell as root

You can also use this one line command from GTFObin

Now we pwned it

Last updated