CMSpit

Room Link: https://tryhackme.com/room/cmspitarrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/80 - HTTP

Kali

CMS Version is 0.11.1

User account compromise

This CMS version has a exploit to help us find users.

Exploit: https://swarm.ptsecurity.com/rce-cockpit-cms/arrow-up-right arrow-up-right

Burp

Burp

Burp

Did the same thing for user skidy

Burp

I don't know if the last part was really necessary. I think maybe the reset token can be different then the other token in which case the above step would be necessary but its the same so I just updated the password for skidy.

Burp

I can now login as Skidy

Initial Shell

Kali

Get autocomplete

Lateral Movement (Stux)

Victim

Victim

Victim

Privilege Escalation

Exploit: https://github.com/convisolabs/CVE-2021-22204-exiftool/blob/master/exploit.pyarrow-up-right

Victim(receiving)

Kali(sending)

Victim

Victim

Last updated