You’ll find this vm in https://www.vulnhub.com/entry/icmp-1,633/
Port Scan
1 |
|
1 |
|
Searchsploit
- If we check the port
80
we will see that it runs theMonitorr
Software
1 |
|
1 |
|
Python Script - Edited
1 |
|
Reverse Shell
- My VM
1 |
|
- Listener
1 |
|
Enumeration
- reminder
1 |
|
1 |
|
SSH Login | USER
- credentials
fox
:BUHNIJMONIBUVCYTTYVGBUHJNI
- local.txt : c9db6c88939a2ae091c431a45fb1e59c
Sudo | hping3
$ sudo -l
[sudo] password for fox:
Matching Defaults entries for fox on icmp:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User fox may run the following commands on icmp:
(root) /usr/sbin/hping3 --icmp *
(root) /usr/bin/killall hping3
Read root id_rsa using hping3
- Terminal
1
1 |
|
- Terminal
2
1 |
|
- After running the above commands in terminal 1 the id_rsa of root will be printed
Rooted
1 |
|
- proof.txt : 9377e773846aeabb51b37155e15cf638