CMSpit
Room Link: https://tryhackme.com/room/cmspit
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
Kali

TCP/80 - HTTP
Kali
CMS Version is 0.11.1

User account compromise
This CMS version has a exploit to help us find users.
Exploit: https://swarm.ptsecurity.com/rce-cockpit-cms/
Burp

Burp

Burp

Did the same thing for user skidy
Burp

I don't know if the last part was really necessary. I think maybe the reset token can be different then the other token in which case the above step would be necessary but its the same so I just updated the password for skidy.
Burp

I can now login as Skidy

Initial Shell
Kali





Get autocomplete
Lateral Movement (Stux)
Victim

Victim

Victim

Privilege Escalation
Exploit: https://github.com/convisolabs/CVE-2021-22204-exiftool/blob/master/exploit.py
Victim(receiving)
Kali(sending)
Victim
Victim

Last updated