6379
Enumerating with nmap script:
nmap --script redis-info -sV -p 6379 192.168.190.93
Now we can follow this:
From hacktricks.
Now upload this in ftp pub folder:
Now we can continue exploiting redis:
then:
Now we can execute commands:

Now for reverse shell:
Then:

We get a shell: 
Running linpeas: 
Now lets try running this cron job:
utils.so is missing.
And since we have access to the environment variable we can go to /usr/bin/local/lib/dev And create a file called pe.c:
Now we can compile:
Now when the cron job is started as root it will use the utils.so from /usr/bin/local/lib/dev directory and we will get a reverse shell. 
Last updated
Was this helpful?