FunboxEasyEnum - Easy

Nmap Scan

┌─[sheinn101@parrot]─[~/offsec/FunboxEasyEnum]
└──╼ [??]$ sudo nmap -sC -sV -oN nmap.out 192.168.129.132
Starting Nmap 7.92 ( https://nmap.org ) at 2021-11-06 22:37 +0630
Nmap scan report for 192.168.129.132
Host is up (0.27s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 9c:52:32:5b:8b:f6:38:c7:7f:a1:b7:04:85:49:54:f3 (RSA)
|   256 d6:13:56:06:15:36:24:ad:65:5e:7a:a1:8c:e5:64:f4 (ECDSA)
|_  256 1b:a9:f3:5a:d0:51:83:18:3a:23:dd:c4:a9:be:59:f0 (ED25519)
80/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 39.57 seconds

Directory Scan

In robots.txt

In mini.php , we get a shell to upload files.

Uploading Reverse Shell

In Linux php-reverse-shell.php is already builtin, so you can find with this command

locate php-reverse-shell.php

You can also upload with curl command

When we uploaded shell, listen with nc and visit the url or run curl command

From /etc/passwd ,we got a user which is called goat

As a easy box, we should brute force ssh that username with hydra

SSH Bruteforcing with Hydra

Now we got goat password and switch to that user.

Privilege Escalaption

Always try sudo -l first and we see mysql can run as root without password.

Type this command to get shell as root

You can also use this one line command from GTFObinarrow-up-right

Now we pwned it

Last updated