FunboxEasyEnum - Easy
Nmap Scan
┌─[sheinn101@parrot]─[~/offsec/FunboxEasyEnum]
└──╼ [??]$ sudo nmap -sC -sV -oN nmap.out 192.168.129.132
Starting Nmap 7.92 ( https://nmap.org ) at 2021-11-06 22:37 +0630
Nmap scan report for 192.168.129.132
Host is up (0.27s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 9c:52:32:5b:8b:f6:38:c7:7f:a1:b7:04:85:49:54:f3 (RSA)
| 256 d6:13:56:06:15:36:24:ad:65:5e:7a:a1:8c:e5:64:f4 (ECDSA)
|_ 256 1b:a9:f3:5a:d0:51:83:18:3a:23:dd:c4:a9:be:59:f0 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 39.57 secondsDirectory Scan
In robots.txt

In mini.php , we get a shell to upload files.

Uploading Reverse Shell
In Linux php-reverse-shell.php is already builtin, so you can find with this command
locate php-reverse-shell.php
You can also upload with curl command
When we uploaded shell, listen with nc and visit the url or run curl command

From /etc/passwd ,we got a user which is called goat
As a easy box, we should brute force ssh that username with hydra
SSH Bruteforcing with Hydra
Now we got goat password and switch to that user.
Privilege Escalaption
Always try sudo -l first and we see mysql can run as root without password.
Type this command to get shell as root
You can also use this one line command from GTFObin
Now we pwned it

Last updated