You’ll find this vm in https://www.vulnhub.com/entry/icmp-1,633/
Port Scan
1 | |
1 | |
Searchsploit
- If we check the port
80we will see that it runs theMonitorrSoftware
1 | |
1 | |
Python Script - Edited
1 | |
Reverse Shell
- My VM
1 | |
- Listener
1 | |
Enumeration
- reminder
1 | |
1 | |
SSH Login | USER
- credentials
fox:BUHNIJMONIBUVCYTTYVGBUHJNI - local.txt : c9db6c88939a2ae091c431a45fb1e59c
Sudo | hping3
$ sudo -l
[sudo] password for fox:
Matching Defaults entries for fox on icmp:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User fox may run the following commands on icmp:
(root) /usr/sbin/hping3 --icmp *
(root) /usr/bin/killall hping3Read root id_rsa using hping3
- Terminal
1
1 | |
- Terminal
2
1 | |
- After running the above commands in terminal 1 the id_rsa of root will be printed
Rooted
1 | |
- proof.txt : 9377e773846aeabb51b37155e15cf638