You can find this machine here : https://tryhackme.com/room/ohmyweb
Port Scan
1 | |
Directory Scan
1 | |
Wappalyzer - Port 80
Searching
Search : Apache httpd 2.4.49 exploit
Result : https://www.exploit-db.com/exploits/50383
Apache HTTP Server 2.4.49 - Path Traversal & RCE
CVE : CVE-2021-41773
1 | |
1 | |
Reverse Shell Creation
Source : https://www.youtube.com/watch?v=WSVcuV2Wc58
1 | |
1 | |
1 | |
1 | |
Better Shell
1 | |
LinPeas
1 | |
Linux Capabilities - Privileges Escalation
1 | |
1 | |
User Owned - Proof

Found IP
Host Discovery
- awk
- arp
1 | |
Port Scan
Binary here : https://github.com/andrew-d/static-binaries/blob/master/binaries/linux/x86_64/nmap
1 | |
- Starting the Scan
1 | |
Identify The Service (Port 5986)
OMIGOD Unauthenticated RCE
- Source :
https://github.com/AlteredSecurity/CVE-2021-38647 - Source :
https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure/
1 | |
1 | |
1 | |
Reverse Shell - Root Owned
1 | |