80

Running feroxbuster we discover /old/:

feroxbuster -u http://192.168.182.225/ -C 404,400 -A --wordlist '/usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt' -B --auto-tune

Now to check the difference:

This seems new.

Adding to /etc/hosts

http://customers-survey.marketing.pg/:

At /admin: We can try admin:password

Now we are logged in:

Using this exploit:

Now editing php-rev.php:

We can zip this now:

Now we can change the path at exploit.py:

Now we can run it after running listener:

We get a shell:

Running linpeas: We discover a password.

Using this password on both users in /home:

We are t.miller now.

Running sudo -l:

Checking id: We are in mlocate group

Now we can find files owned by group mlocate:

We find a file called creds-for-2022.txt

Ughhhh didnt work will try later

Last updated

Was this helpful?