80
Last updated
Last updated
Running feroxbuster:
We discover a backup.zip.
We can see the code for the web application:
It is a POST request to upload.php
Now to reverse this:
Running it we get the magic byte we need:
We can upload a shell this way.
Now we can test it: http://192.168.155.33/upload/shell.php?cmd=whoami
Now to get a shell:
Start a listener:
We find an unknown SUID binary using linpeas:
This is find binary.
Using the gtfobins for find: