80
Running feroxbuster we discover /old/:
Now to check the difference:
This seems new.
Adding to /etc/hosts
http://customers-survey.marketing.pg/:
At /admin: We can try admin:password
Now we are logged in:
Using this exploit:
Now editing php-rev.php:
We can zip this now:
Now we can change the path at exploit.py:
Now we can run it after running listener:
We get a shell:
Running linpeas: We discover a password.
Using this password on both users in /home
:
We are t.miller now.
Running sudo -l
:
Checking id: We are in mlocate group
Now we can find files owned by group mlocate:
We find a file called creds-for-2022.txt
Ughhhh didnt work will try later
Last updated