80
Last updated
Last updated
We can view sourcecode: There is a subdomain: Adding to hosts and accessing:
Using this exploit:
We are logged in.
We find an id_rsa file in marco's changelogs: It is asking password so we can use ssh2john:
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt We cracked it.
Now we can ssh to marcot: Running linpeas we find mails:
We can try to give everyone permissions:
we can only access marcot's mails. We have a password for matthew
Now we can switch to matthewa user:
There is a weird file.
We have password for a user.
In /etc/passwd
:
It's braind user's password. We are briand:
Now we can use gtfobins:
We can get root now: