Page cover

[Linux] Simple CTF

Enumeration

sudo nmap 10.10.56.128

HTTP

Robots.txt

First we look at the website. The nmap scan showed the presence of a robot.txt file. We should look at what is indide.

We get these informations:

  • web pages: /openemr-5_0_1_3, /

  • name: mike

Both web pages cannot be accessed.

Directory listing

We see that the website is build on a CMS called CMS Made Simple.

FTP

We can't find anythinf interesting on the ftp server. The server enter in a passive mode when we want to access list its ressources. We don't try anything further.

Exploitation

CMS made simple is vulnrable to CVE-2019-9053. We use the following exploit to abuse the service: CVE-2019-9053arrow-up-right.

We got:

  • a username: mitch

  • an email: admin@admin.com

  • a password: secret

We get access to the admin administration page on the website.

SSH

We stayed at this stage until we did another enumeration phase on the remaing port (2222). Bingo! an SSH service runs at this port:

We can try the credentials on the ssh service.

Privilege Escalation

We can explore GTFOBinsarrow-up-right to see how we can elevate our privilege on the system as we are allowed to run vim command as root.

Remediation

Last updated