8021
Last updated
Last updated
Now using the exploit:
Now renaming:
Now we can edit the password to the one we got from cassandra on port [[PG Practice/Clue/3000]]
Now to get a shell: shell.sh:
Start a python server:
Now start a listener:
We can get a shell:
We can switch to cassie with the creds:
Now we are cassie:
We can run cassandra-web as sudo:
Now we are running cassandra as root on port 4444.
Now we can forward the port on one more port:
Now we can run chisel on kali:
On target:
Now we can try getting anthony's ssh key:
Now we can check by visiting 127.0.0.1:4444: Now we can use the cassandra exploit:
We are root.
This key does not work for anthony. So checking anthony's history:
We can see that anthony's public key is in root's authorized_keys: We can login to root with the previously obtained id_rsa from anthony's folder: