You’ll find this vm here : https://www.vulnhub.com/entry/phineas-1,674/
Port Scan
1 |
|
Directory Scan
1 |
|
- /structure
1 |
|
- /structure/fuel
1 |
|
Searchsploit
1 |
|
Copy the Script
1 |
|
Edited Script
1 |
|
Run the Script
1 |
|
Reverse Shell
Note the reverse shell should be url encoded
1 |
|
- Terminal 1
1 |
|
- Terminal 2
1 |
|
Searching for user password
-
Note always check
config
files -
Credentials are here :
/var/www/html/structure/fuel/application/config/database.php
1 |
|
SSH Login
Credentials anna
: H993hfkNNid5kk
1 |
|
Netstat
- Run
netstat -lntup
to see listening ports
1 |
|
- Our target is
127.0.0.1:5000
Port Forwarding
1 |
|
Pickle
- The port 5000 run the
app.py
- The
pickle.loads(data)
is vulnerable to pickledeserialization
RCE
1 |
|
Creating the script
1 |
|
Run it
1 |
|
Exploit
- Use
curl
- Send
POST
request tohttp://127.0.0.1:5000/heaven
- Parameter is
awesome
1 |
|
In Action
- Terminal 1
1 |
|
- Terminal 2
1 |
|