6379

Enumerating with nmap script:

nmap --script redis-info -sV -p 6379 192.168.190.93

Now we can follow this: From hacktricks.

Now upload this in ftp pub folder: Now we can continue exploiting redis:

then:

Now we can execute commands:

Now for reverse shell:

Then:

We get a shell:

Running linpeas:

Now lets try running this cron job: utils.so is missing.

And since we have access to the environment variable we can go to /usr/bin/local/lib/dev And create a file called pe.c:

Now we can compile:

Now when the cron job is started as root it will use the utils.so from /usr/bin/local/lib/dev directory and we will get a reverse shell.

Last updated

Was this helpful?