You’ll find this vm here : https://www.vulnhub.com/entry/phineas-1,674/
Port Scan
1 | |
Directory Scan
1 | |
- /structure
1 | |
- /structure/fuel
1 | |
Searchsploit
1 | |
Copy the Script
1 | |
Edited Script
1 | |
Run the Script
1 | |
Reverse Shell
Note the reverse shell should be url encoded
1 | |
- Terminal 1
1 | |
- Terminal 2
1 | |
Searching for user password
-
Note always check
configfiles -
Credentials are here :
/var/www/html/structure/fuel/application/config/database.php
1 | |
SSH Login
Credentials anna : H993hfkNNid5kk
1 | |
Netstat
- Run
netstat -lntupto see listening ports
1 | |
- Our target is
127.0.0.1:5000
Port Forwarding
1 | |
Pickle
- The port 5000 run the
app.py - The
pickle.loads(data)is vulnerable to pickledeserializationRCE
1 | |
Creating the script
1 | |
Run it
1 | |
Exploit
- Use
curl - Send
POSTrequest tohttp://127.0.0.1:5000/heaven - Parameter is
awesome
1 | |
In Action
- Terminal 1
1 | |
- Terminal 2
1 | |