80

Running feroxbuster we discover /old/:
feroxbuster -u http://192.168.182.225/ -C 404,400 -A --wordlist '/usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt' -B --auto-tuneNow to check the difference:
This seems new.
Adding to /etc/hosts
http://customers-survey.marketing.pg/: 
At /admin:
We can try admin:password
Now we are logged in: 
Using this exploit:
Now editing php-rev.php: 
We can zip this now:
Now we can change the path at exploit.py: ![]()
Now we can run it after running listener:
We get a shell: 
Running linpeas:
We discover a password.
Using this password on both users in /home:

We are t.miller now.
Running sudo -l:

Checking id:
We are in mlocate group
Now we can find files owned by group mlocate:
We find a file called creds-for-2022.txt
Ughhhh didnt work will try later
Last updated
Was this helpful?