80
Last updated
Last updated
Running feroxbuster we discover /old/:
Now to check the difference:
Using this exploit:
We can zip this now:
Now we can run it after running listener:
We are t.miller now.
Now we can find files owned by group mlocate:
Ughhhh didnt work will try later
This seems new.
Adding to /etc/hosts
http://customers-survey.marketing.pg/:
At /admin: We can try admin:password
Now we are logged in:
Now editing php-rev.php:
Now we can change the path at exploit.py:
We get a shell:
Running linpeas: We discover a password.
Using this password on both users in /home
:
Running sudo -l
:
Checking id: We are in mlocate group
We find a file called creds-for-2022.txt